User Manual

Add to my manuals
215 Pages

advertisement

User Manual | Manualzz

Multi-WAN

SSL / IPSec VPN QoS Router

Load Balancing, Bandwidth Management

VPN & Network Security Management

English User’s Manual

Enterprise Multi-WAN VPN QoS Router

Product Manual Using Permit Agreement

[Product Manual (hereafter the "Manual") Using Permit Agreement] hereafter the "Agreement" is the using permit of the Manual, and the relevant rights and obligations between the users and Qno Technology Inc

(hereafter "Qno"), and is the exclusion to remit or limit the liability of Qno. The users who obtain the file of this manual directly or indirectly, and users who use the relevant services, must obey this Agreement.

Important Notice: Qno would like to remind the users to read the clauses of the "Agreement" before downloading and reading this Manual. Unless you accept the clauses of this "Agreement", please return this

Manual and relevant services. The downloading or reading of thi1s Manual is regarded as accepting this

"Agreement" and the restriction of clauses in this "Agreement".

【1】Statement of Intellectual Property

Any text and corresponding combination, diagram, interface design, printing materials or electronic file are protected by copyright of our country, clauses of international copyright and other regulations of intellectual property. When the user copies the "Manual", this statement of intellectual property must also be copied and indicated. Otherwise, Qno regards it as tort and relevant duty will be prosecuted as well.

【2】Scope of Authority of "Manual"

The user may install, use, display and read this "Manual on the complete set of computer.

【3】User Notice

If users obey the law and this Agreement, they may use this "Manual" in accordance with "Agreement". The

"hardcopy or softcopy" of this Manual is restricted using for information, non-commercial and personal purpose. Besides, it is not allowed to copy or announce on any network computer. Furthermore, it is not allowed to disseminate on any media. It is not allowed to modify any part of the "file". Using for other purposes is prohibited by law and it may cause serious civil and criminal punishment. The transgressor will receive the accusation possibly.

【4】Legal Liability and Exclusion

【4-1】Qno will check the mistake of the texts and diagrams with all strength. However, Qno, distributors, and resellers do not bear any liability for direct or indirect economic loss, data loss or other corresponding commercial loss to the user or relevant personnel due to the possible omission.

【4-2】In order to protect the autonomy of the business development and adjustment of Qno, Qno reserves

1

Enterprise Multi-WAN VPN QoS Router

the right to adjust or terminate the software / Manual any time without informing the users. There will be no further notice regarding the product upgrade or change of technical specification. If it is necessary, the change or termination will be announced in the relevant block of the Qno website.

【4-3】All the set parameters are examples and they are for reference only. You may also purpose your opinion or suggestion. We will take it as reference and they may be amended in the next version.

【4-4】This Manual explains the configuration of all functions for the products of the same series. The actual functions of the product may vary with the model. Therefore, some functions may not be found on the product you purchased.

【4-5】Qno reserves the right to change the file content of this Manual and the Manual content may not be updated instantly. To know more about the updated information of the product, please visit Qno official website.

【4-6】Qno (and / or) distributors hereby declares that no liability will be born for any guarantee and condition of the corresponding information. The guarantee and condition include tacit guarantee and condition about marketability, suitability for special purposes, ownership, and non-infringement. The name of the companies and products mentioned may be the trademark of the owners. Qno (and/or) the distributors do not provide the product or software of any third party company. Under any circumstance, Qno and / or distributors bear no liability for special, indirect, derivative loss or any type of loss in the lawsuit caused by usage or information on the file, no matter the lawsuit is related to agreement, omission, or other tort.

【5】Other Clauses

【5-1】The potency of this Agreement is over any other verbal or written record. The invalidation of part or whole of any clause does not affect the potency of other clauses.

【5-2】The power of interpretation, potency and dispute are applicable for the law of Taiwan. If there is any dissension or dispute between the users and Qno, it should be attempted to solve by consultation first. If it is not solved by consultation, user agrees that the dissension or dispute is brought to trial in the jurisdiction of the court in the location of Qno. In Mainland China, the "China International Economic and Trade Arbitration

Commission" is the arbitration organization.

2

Enterprise Multi-WAN VPN QoS Router

Content

I. Introduction ............................................................................................................................................... 1

II. Multi- WAN VPN QoS Router Installation .......................................................................................... 3

2.1 Systematic Setting Process ........................................................................................................................... 3

2.2 Flow Chart about Setting .................................................................................................................................... 3

III. Hardware Installation ............................................................................................................................ 6

3.1 VPN QoS Router LED Signal ........................................................................................................................ 6

3.2 VPN QoS Router Network Connection ........................................................................................................ 8

IV. Login VPN QoS Router ......................................................................................................................... 9

V. Device Spec Verification, Status Display and Login Password and Time Setting ............... 11

5.1 Home Page..................................................................................................................................................... 11

5.1.1 WAN Status ............................................................................................................................................ 11

5.1.2 Physical Port Status ................................................................................................................................ 12

5.1.3 System Information ................................................................................................................................ 13

5.1.4 Firewall Status ....................................................................................................................................... 14

5.1.5 Log Setting Status .................................................................................................................................. 14

5.2 Change and Set Login Password and Time .............................................................................................. 15

5.2.1 Password Setting .................................................................................................................................... 15

5.2.2 Time ....................................................................................................................................................... 16

VI. Network .................................................................................................................................................. 18

6.1 Network Connection ......................................................................................................................................... 18

6.1.1 Host Name and Domain Name .............................................................................................................. 18

6.1.2 LAN Setting ........................................................................................................................................... 19

6.1.3 WAN & DMZ Settings ........................................................................................................................... 20

6.2 Multi- WAN Setting .......................................................................................................................................... 28

6.2.1 Load Balance Mode ........................................................................................................................... 28

6.2.2 Network Service Detection .................................................................................................................... 32

6.2.3 Protocol Binding .................................................................................................................................... 35

VII. Intranet Configuration ....................................................................................................................... 44

7.1 Setup ................................................................................................................................................................. 44

7.2 Port Status ......................................................................................................................................................... 47

7.3 IP/ DHCP .......................................................................................................................................................... 49

7.4 DHCP Status ..................................................................................................................................................... 52

7.5 IP & MAC Binding ........................................................................................................................................... 54

7.6 IP Grouping ....................................................................................................................................................... 58

3

Enterprise Multi-WAN VPN QoS Router

VIII. QoS (Quality of Service) .................................................................................................................. 59

8.1 Bandwidth Management ................................................................................................................................... 60

8.1.1 The Maximum Bandwidth provided by ISP .......................................................................................... 60

8.1.2 QoS ........................................................................................................................................................ 61

8.2 Session control .................................................................................................................................................. 65

8.3 Smart QoS ......................................................................................................................................................... 68

IX. Firewall ................................................................................................................................................... 69

9.1 General Policy .................................................................................................................................................. 69

9.2 Restrict Application .......................................................................................................................................... 73

9.3 Access Rule ....................................................................................................................................................... 75

9.4 Content Filter .................................................................................................................................................... 79

X. VPN (Virtual Private Network) ............................................................................................................ 84

10.1. VPN ............................................................................................................................................................... 84

10.1.1. Display All VPN Summary ................................................................................................................. 84

10.1.2. Add a New VPN Tunnel ...................................................................................................................... 87

10.1.3. PPTP Server ...................................................................................................................................... 107

10.1.4. VPN Pass Through ............................................................................................................................ 109

10.2. QnoKey ........................................................................................................................................................ 109

10.2.1. QnoKey Summary ............................................................................................................................ 110

10.2.2 Qnokey Group Setup ........................................................................................................................... 111

10.2.3 Qnokey Account List ......................................................................................................................... 114

10.3. QVM VPN Function Setup .......................................................................................................................... 116

10.3.1. QVM Server Settings ........................................................................................................................ 117

XI. Virtue Route ........................................................................................................................................ 119

11.1 Virtue Route Server (PPTP Server) ............................................................................................................... 121

XII. SSL VPN .............................................................................................................................................. 124

SSL VPN ..................................................................................................................................................... 125

12.1 Status............................................................................................................................................................. 125

12.2 Group Summary ............................................................................................................................................ 126

12.3 Group Management: ..................................................................................................................................... 127

12.4 Domain Management .................................................................................................................................... 144

12.5 User Management ......................................................................................................................................... 145

12.6 Service Resource Management ..................................................................................................................... 149

12.6.1 Banner ................................................................................................................................................ 149

12.6.2 Resource Configuration ..................................................................................................................... 150

4

Enterprise Multi-WAN VPN QoS Router

12.7 Link to Portal ................................................................................................................................................ 152

12.8 Advanced Settings......................................................................................................................................... 152

12.8.1 Virtual Passage ................................................................................................................................... 153

XIII. Advanced Function ......................................................................................................................... 157

13.1 DMZ Host/ Port Range Forwarding ............................................................................................................. 157

13.1.1 DMZ Host .......................................................................................................................................... 157

13.1.2 Port Range Forwarding ...................................................................................................................... 157

13.2 Routing ......................................................................................................................................................... 161

13.3.1 Dynamic Routing ............................................................................................................................... 161

13.3.2 Static Routing..................................................................................................................................... 162

13.4 One to One NAT ........................................................................................................................................... 164

13.5 DDNS- Dynamic Domain Name Service ..................................................................................................... 166

13.6 MAC Clone ................................................................................................................................................... 172

XIV. System Tool ...................................................................................................................................... 173

14.1 Diagnostic ..................................................................................................................................................... 173

14.2 Firmware Upgrade ........................................................................................................................................ 175

14.3 Configration Backup ..................................................................................................................................... 176

14.4 System Recover ............................................................................................................................................ 177

XV Log ........................................................................................................................................................ 179

15.1 System Log ................................................................................................................................................... 179

15.2 System Statistic ............................................................................................................................................. 184

15.3 Traffic Statistic .............................................................................................................................................. 186

15.4 IP/ Port Statistic ............................................................................................................................................ 188

XVI. Log out ............................................................................................................................................... 191

Appendix I: User Interface and User Manual Chapter Cross Reference ................................... 192

Appendix IITroubleshooting ............................................................................................................. 195

(1) Block BT Download ...................................................................................................................................... 195

(2)Shock Wave and Worm Virus Prevention ................................................................................................... 196

(3)Block QQLive Video Broadcast Setting ..................................................................................................... 198

(4)ARP Virus Attack Prevention ...................................................................................................................... 200

Appendix IIIQno Technical Support Information ......................................................................... 209

5

Enterprise Multi-WAN VPN QoS Router

I. Introduction

Qno Multi-WAN VPN QoS Router (referred as VPN QoS Router hereinafter) is a business level firewall router, applied by medium and large-scale enterprises, internet cafes, and communities, etc. High speed professional network processor and high standard in SDRAM and Flash offers it super networking efficiency, almost equal to those of expensive enterprise-level VPN QoS Routers.

What’s more, built-in

10/100Mbps/1000Mbps QoS and 10/100 /1000Base-T/TX Ethernets (RJ45) WAN ports, plus its VLAN switching board makes it outstanding in similar products.

Firstly, VPN QoS Router integrates most of the traditional features Qno Router has:

Multi-WANs

This special design gives VPN QoS Router Auto Load Balance, Exclusive Routing

(remaining WAN balance) and Strategy Routing for high-efficiency network;

Access Rules & QoS Managemengt

To control web access, users can build and edit filter lists. It also enables users to ban or monitor websites according to their needs. By the filter setting and complete

QoS management, school and business internet management will be clearly improved.

DMZ Port

It can support 10/100 Base-T/TX Ethernet (RJ45) and provide the features of

Virtual Route, Microsoft UpnP, VLAN, Multi Subnet, and Transparent Bridge.

On-line SysLog records

VPN QoS Router supports on-line management setup tools; it makes setting up networks easy to understand. It also reinforces the management of network access rules, VPN, and all other network services.

Other Functions

DHCP, fixed IP, PPPoE, Port Binding, Static/Dynamic routing, NAT, one to one NAT,

PAT, MAC Clone, as well as DDNS. It makes the network environment more flexible and easier to manage.

Secondly, VPN QoS Router provides VPN (virtual networknetwork),which works under the IPSec Protocol. IPSec VPN provides DES, 3DES, AES-128 encryption,

MD5, SH1 certification, IKE Pre-Share Key, or manual password interchange. It enables enterprises to benefit from VPN without being troubled with technical and network management problems. The central control function enables the host to log in remote client computers at any time. Security and secrecy are guaranteed to meet the IPSec standard, so as to ensure the continuity of VPN service.

Besides, VPN QoS Router also has unique QVM VPN- SmartLink IPSec VPN. Just

1

Enterprise Multi-WAN VPN QoS Router

input VPN server IP, user name, and password, and IPSec VPN will be automatically set up. Through VPN QoS Router exclusive QVM function, users can set up QVM to work as a server, and have it accept other QVM series products from client ports. QVM offers easy VPN allocation for users; users can do it even without a network administrator.In addition, QVM1250 features NetBIOS transparency, and supports IP grouping for connections between clients and host in the virtual private network.

Thirdly, VPN QoS Router offers the function of a standard PPTP server, which is equipped with connection setting status. Each WAN port can be set up with multiple

DDNS at the same time. It is also capable of establishing VPN connections with dynamic IP addresses.

Fourthly, the advanced built-in firewall enables VPN QoS Router to prevent most attacks from the Internet. It utilizes active detection technology SPI (Stateful Packet

Inspection). SPI mainly within the network by dynamically inspecting each link, also warn for the application process; therefore, it can refuse connections to non-standard communication protocols.

VPN QoS Router fully protects the safety of communication between all offices and branches of an organization. It helps to free enterprises from increasing hacker intrusion. With an exclusive independent operation platform, users are able to set up and use a firewall without professional network knowledge. VPN QoS Router setting up and management can be carried out through web browsers, such as IE,

Netscape, etc.

The specific functions will be described in the following chapters.

2

Enterprise Multi-WAN VPN QoS Router

II. Multi- WAN VPN QoS Router Installation

This chapter introduces hardware installation. Through the understanding of multi-WAN setting process, users can easily setup and manage the network, making VPN QoS Router functioning better.

2.1 Systematic Setting Process

Users can set up and enable the network by utilizing bandwidth efficiently. The network can achieve the ideal efficientness,block attacks, and prevent security risks at the same time. Through the process settings, users can install and operate VPN QoS Router easily. This simplifies the management and maintenance, making the user network settings be done at one time. The main process is as below:

1. Hardware installation

2. Login

3. Verify device specification and set up password and time

4. Set WAN connection

5. Set LAN connection: physical port and IP address settings

6. Set QoS bandwidth management: avoid bandwidth occupation

7. Set Firewall: prevent attack and improper access to network resources

8. Set UPnP, DDNS, MAC Clone

9. Set Management and maintenance about Syslog, SNMP, and configuration backup

12. Logout

2.2 Flow Chart about Setting

Below is the description for each setting process, and the crospondent contents and purposes. For detailed functions, please refer to Appendix I: Setting Inferface and Chapter Index.

10. Set VPN (Virtual Private Network), QnoKey, QVM VPN

11. Set SSL VPN

3

Enterprise Multi-WAN VPN QoS Router

NO.

1

2

3

4

5

6

7

Setting Items

Hardware installation

Content

Configure the network to meet user’s demand.

Login

Verify device specification

Login the device with

Web Browser.

Verify Firmware version and working status.

Set password and time Set time and re-new password.

Purpose

Install VPN QoS Router hardware based on user physical requirements.

Login VPN QoS Router web-based UI.

Verify VPN QoS Router specification, Firmware version and working status.

Set WAN connection

Modify the login password considering safe issue.

Synchronize the VPN QoS Router time with

WAN.

Connect to WAN. Configure bandwidth to optimize data transmission.

Set LAN connection: physical port and IP address settings

Verify WAN connection setting, bandwidth allocation, and protocol binding.

Set mirror port and

VLAN. Allocate and manage LAN IP.

Provide mirror port, port management and

VLAN setting functions. Support Static/DHCP

IP allocation to meet different needs. IP group will simplify the management work.

Set QoS bandwidth management: avoid bandwidth occupation

Restrict bandwidth and session of WAN ports, LAN IP and application.

To assure transmission of important information, manage and allocate the bandwidth further to achieve best efficiency.

Set Firewall: prevent attack and improper access to network resources

Block attack, Set

Access rule and restrict Web access.

Administrators can block BT to avoid bandwidth occupation, and enable access rules to restrict employee accessing internet improperly or using MSN, QQ and Skype during working time. They can also protect network from Worm or ARP attacking.

4

Enterprise Multi-WAN VPN QoS Router

8

9

Set DMZ/

Forwarding, UPnP,

DDNS, MAC Clone

Set management and maintenance settings about Syslog, SNMP, and configuration backup

DMZ/Forwarding,

UPnP, Routing Mode, multiple WAN IP,

DDNS and MAC

Clone

DMZ/Forwarding, UPnP, Routing Mode, multiple WAN IP, DDNS and MAC Clone

Monitor VPN QoS and configuration backup.

Administrators can look up system log and

Router working status monitor system status and inbound/outbound flow in real time.

10

VPN Virtual Private

Network, QnoKey,

QVM VPN function setting

Configure VPN tunnels, e.g. PPTP,

QnoKey, and QVM

VPN.

Configure different types of VPN to meet different application environment.

11

SSL VPN function

Setting

12 Logout

SSL VPN user authority and the available resources management

Close configuration window.

Settings which users can use SSL VPN and each user or user group permissions.

Management of the resources available

Setting Authentication Server

Logout VPN QoS Router web-based UI.

We will follow the process flow to complete the network setting in the following chapters.

5

Enterprise Multi-WAN VPN QoS Router

III. Hardware Installation

This chapter introduces the physical installation of hardware.

3.1 VPN QoS Router LED Signal

LED Signal Description

LED Color Description

Green Green LED on: Power ON

Power

DIAG

Link/Act

(Green light at the right of the port)

Amber Amber LED on: System self-test is running.

Amber LED off: System self-test is completed successfully.

Green Green LED on: Ethernet connection is fine.

Green LED blinking: Packets are transmitting through Ethernet port.

100M- Speed

(Amber light at th left of the port)

Amber Amber LED on: Ethernet is running at 100 Mbps.

Amber LED off:Ethernet is running at 10 Mbps.

1000M- Speed

(Geen light at th left of the port)

Green

Green LED on:Ethernet is running at 1000 Mbps.

Connect

Green Green LED on: WAN is connected and gets the IP address.

Reset

Action

Press Reset Button For 5 Secs

Press Reset Button Over 10 Secs

Description

Warm Start

DIAG indicator: Amber LED flashing slowly.

Factory Default

DIAG indicator: Amber LED flashing quickly.

System Built-in Battery

A system timing battery is built into VPN QoS Router. The lifespan of the battery is about 1~2 years.

If the battery life is over or it can not be charged, VPN QoS Router will not be able to record time correctly, nor synchronize with internet NTP time server. Please contact your system supplier for information on how to replace the battery.

Attention!

6

Enterprise Multi-WAN VPN QoS Router

Do not replace the battery yourself; otherwise may cause irreparable damage to the product.

Installing VPN

QoS Router on a Standard 19” Rack

It is suggested that either place VPN QoS Router on a desk or install it in a rack with attached brackets. Do not place other heavy objects together with VPN QoS Router on a rack. Overloading may cause the rack to fail, thus causing damage or danger.

Each VPN QoS Router comes with a set of rack installation accessories, including 2 L-shaped brackets and 8 screws. Users can rack-mount the device onto the chassis. Please refer to the figure below:

Attention!

Considering of the device to run smoothly, wherever users install it, be sure not to obstruct the vent on each side of the device. Keep at least 10cm space in front of both the vents for air convection.

7

3.2 VPN QoS Router Network Connection

Enterprise Multi-WAN VPN QoS Router

WAN connection:A WAN port can be connected with xDSL Modem, Fiber Modem, Switching Hub, or the Internet through an external router.

LAN Connection: LAN port can be connected to a Switching Hub or directly to a PC. Users can use servers for monitoring or filtering through the port after

“Physical Port Mangement” configuration is done.

DMZ: DMZ port can be connected to servers that have legal IP addresses, such as Web servers, mail servers, etc..

8

Enterprise Multi-WAN VPN QoS Router

IV. Login VPN QoS Router

This chapter is a brief introduction of VPN QoS Router

’s Web-based UI after connecting.

First, check up VPN QoS Router IP address in PCs with LAN connection under its DOS

. Go Start → Run, enter cmd to commend DOS, and enter ipconfig for getting Default Gateway address, as the graphic below,

192.168.1.1. Make sure Default Gateway is also the default IP address of VPN QoS Router.

Attention!

When users cannot get IP addre ss and default gateway by using “ipconfig”, or the received IP address is 0.0.0.0 and 169.X.X.X, it is recommended that they should check if there is any problem with the circuits or the computer network card is connected nicely or not.

9

Enterprise Multi-WAN VPN QoS Router

Then, click the webpage browser, IE for example, and enter 192.168.1.1 in the website column. The login window will appear as below:

VPN QoS Router default username and password are both “admin”. Users can change the login password in the setting later.

Attention!

For security, we strongly suggest that users must change password after login. Make sure the password safe, or you can not login to VPN QoS Router. Press Reset button for more than 10 sec, all the settings will return to default.

After login, VPN QoS Router web-based UI will appear. Select the language on the upper right corner of the webpage. The language chosen will be in blue. Please select “English” as below.

10

Enterprise Multi-WAN VPN QoS Router

V. Device Spec Verification, Status Display and Login Password and Time Setting

This chapter introduces the device specification and status after login as well as change password and system time settings for security.

5.1 Home Page

In the Home page, all the device

’s parameters and status are listed for users’ reference.

5.1.1 WAN Status

IP Address

Indicates the current IP configuration for WAN port.

Default Gateway Indicates current WAN gateway IP address from ISP.

DNS Server

Indicates the current DNS IP configuration.

Session

Indicates the current session number for each WAN in the device.

Downstream

Bandwidth

Indicates the current downstream bandwidth usage(%) for each WAN.

Usage(%)

Upstream

Bandwidth

Usage(%)

DDNS

Indicates the current upstream bandwidth usage(%) for each WAN.

Indicates if Dynamic Domain Name is activated. The defa ult configuration is “Off”.

Quality of

Service

Indicates how many QoS rules are set.

11

Enterprise Multi-WAN VPN QoS Router

Manual Connect When “Obtain an IP automatically” is selected, two buttons (Release and

Renew) will appear. If a WAN connection, such as PPPoE or PPTP, is selected,

“Disconnect” and “Connect” will appear.

DMZ IP Address

Indicates the current DMZ IP address.

5.1.2 Physical Port Status

The status of all system ports, including each connected and enabled port, will be shown on this

Home page (see above table). Click the respective status button and a separate window will appeare to show detailed data (including setting status summary and statisitcs) of the selected port.

12

Enterprise Multi-WAN VPN QoS Router

The current port setting status information will be shown in the Port Information Table. Examples: type

(10Base-T/100Base-TX/1000Base-T), iniferface (WAN/ LAN/ DMZ), link status (Up/ Down), physical port status (Port Enabled/ Port Disabled), priority (high or normal), speed status (10Mbps or 100Mbps or

1000Mbps), duplex status (Half/ Full), auto negotiation (Enabled or Disabled). The tabble also shows statistics of Receive/ Transmit Packets, Receive/Transmit Packets Byte Count as well as Error Packets

Count.

5.1.3 System Information

Device IP Address/ Subnet Mask:Identifies the current device IP address and subnet mask. The default is 192.168.1.1 and 255.255.255.0

Working Mode:Indicates the current working mode. Can be Gateway or Router mode. The default is

“Gateway” mode.

13

Enterprise Multi-WAN VPN QoS Router

System active time: Indicates how long the device has been running.

Serial Number: This number is the device serial number.

Firmware Version:Information about the device present software version.

Current Time: Indicates the device present time

. Please note:

To have the correct time, users must synchronize the device with the remote NTP server first.

5.1.4 Firewall Status

SPI (Stateful Packet Inspection): Indicates whether SPI (Stateful Packet Inspection) is on or off. The default configuration is “On”.

DoS (Denial of Service):Indicates if DoS attack prevention is activated. The default configuration is

“On”.

Block WAN Request:Indicates that denying the connection from Internet is activated. The default configuration is “On”.

Prevent ARP Virus Attack:Indicates that preventing Arp virus attack is acitvated. The default configura tion is “Off”.

Remote Management: Indicates if remote management is activated (on or off). Click the hyperlink to enter and manage the configuration. The default configuration is “Off”.

Access Rule:Indicates the number of access rule applied in the device.

5.1.5 Log Setting Status

Syslog Server

E-mail Alert

Indicates if Syslog Server is Enabled or Disabled.

Indicates if Email Alert is Enabled or Disabled.

14

Enterprise Multi-WAN VPN QoS Router

5.2 Change and Set Login Password and Time

5.2.1 Password Setting

When you login the device setting window every time, you must enter the password. The default value for the device username and password are both “admin”. For security reasons, we strongly recommend that you must change your password after first login. Please keep the password safe, or you might not login to the device. You can press Reset button for more than 10 sec, the device will return back to default.

User Name

Old Password

New User Name

New Password

Confirm New

Password

Apply

The default is “admin”.

Input the original password.(The default is

“admin”.)

Input the new user name. i.e.Qno

Input the new password.

Input the new password again for verification.

Click

“Apply” to save the configuration.

15

Cancel

Enterprise Multi-WAN VPN QoS Router

Click

“Cancel" to leave without making any change. This action will be effective before ”Apply” to save the configuration.

5.2.2 Time

The device can adjust time setting. Users can know the exact time of event occurrences that are recorded in the System Log, and the time of closing or opening access for Internet resources. You can either select the embedded NTP Server synchronization function or set up a time reference.

Synchronize with external NTP server:The device has embedded NTP server, which will update the time spontaneously.

Time Zone

Daylight Saving

Select your location from the pull-down time zone list to show correct local time.

If there is Daylight Saving Time in your area, input the date range. The device will adjust the time for the Daylight Saving period automatically.

16

Enterprise Multi-WAN VPN QoS Router

External NTP Server

Apply

Cancel

If you have your own preferred time server, input the server IP address.

After the changes are completed, click

“Apply” to save the configuration.

Click

“Cancel" to leave without making any change. This action will be effective before ”Apply” to save the configuration.

Select the Local Time Manually: Input the correct time, date, and year in the boxes.

After the changes are completed, click

“Apply” to save the configuration. Click “Cancel" to leave without making any change. This action will be effective before ”Apply” to save the configuration.

17

Enterprise Multi-WAN VPN QoS Router

VI. Network

This Network page contains the basic settings. For most users, completing this general setting is enough for connecting with the Internet. However, some users need advanced information from their ISP. Please refer to the following descriptions for specific configurations.

6.1 Network Connection

6.1.1 Host Name and Domain Name

Device name and domain name can be input in the two boxes. Though this configuration is not

18

Enterprise Multi-WAN VPN QoS Router

necessary in most environments, some ISPs in some countries may require it.

6.1.2 LAN Setting

This is configuration information for the device current LAN IP address. The default configuration is

192.168.1.1 and the default Subnet Mask is 255.255.255.0. It can be changed according to the actual network structure.

Multiple-Subnet Setting:

Click “Unified IP Management” to enter the configuration page, as shown in the following figure. Input the respective IP addresses and subnet masks.

This function enables users to input IP segments that differ from the router network segment to the multi-net segment configuration; the Internet will then be directly accessible. In other words, if there are already different IP segment groups in the Intranet, the Internet is still accessible without making any changes to internal PCs. Users can make changes according to their actual network structure.

19

6.1.3 WAN & DMZ Settings

WAN Setting:

Enterprise Multi-WAN VPN QoS Router

Interface: An indication of which port is connected.

Connection Type: Obtain an IP automatically, Static IP connection, PPPoE (Point-to-Point Protocol over

Ethernet), PPTP (Point-to-Point Tunneling Protocol) or Transparent Bridge.

Config.: A modification in an advanced configuration: Click Edit to enter the advanced configuration page.

Obtain an Automatic IP automatically:

This mode is often used in the connection mode to obtain an automatic DHCP IP. This is the device system default connection mode. It is a connection mode in which DHCP clients obtain an IP address automatically. If having a different connection mode, please refer to the following introduction for selection of appropriate configurations. Users can also set up their own DNS IP address. Check the options and input the user-defined DNS IP addresses.

Use the following DNS Server

Select a user-defined DNS server IP address.

Addresses:

DNS Server:

Input the DNS IP address set by ISP. At least one IP group should be input. The maximum acceptable groups is two IP groups.

20

Enterprise Multi-WAN VPN QoS Router

After the changes are completed, click

“Apply” to save the configuration, or click “Cancel" to leave without making any changes.

Static IP

If an ISP issues a static IP (such as one IP or eight IP addresses, etc.), please select this connection mode and follow the steps below to input the IP numbers issued by an ISP into the relevant boxes.

WAN IP address:

Subnet Mask:

Default Gateway:

DNS Server:

Input the available static IP address issued by ISP.

Input the subnet mask of the static IP address issued by ISP, such as:

Issued eight static IP addresses: 255.255.255.248

Issued 16 static IP addresses: 255.255.255.240

Input the default gateway issued by ISP. For ADSL users, it is usually an

ATU-R IP address. As for optical fiber users, please input the optical fiber switching IP.

Input the DNS IP address issued by ISP. At least one IP group should be input.

The maximum acceptable is two IP groups.

After the changes are completed, click

“Apply” to save the configuration, or click “Cancel" to leave without making any changes.

PPPoE

This option is for an ADSL virtual dial-up connection (suitable for ADSL PPPoE). Input the user

21

Enterprise Multi-WAN VPN QoS Router

connection name and password issued by ISP. Then use the PPP Over-Ethernet software built into the device to connect with the Internet. If the PC has been installed with the PPPoE dialing software provided by ISP, remove it. This software will no longer be used for network connection.

User Name:

Password

Connect on Demand:

Keep Alive:

Input the user name issued by ISP.

Input the password issued by ISP.

This function enables the auto-dialing function to be used in a PPPoE dial connection. When the client port attempts to connect with the Internet, the device will automatically make a dial connection. If the line has been idle for a period of time, the system will break the connection automatically.

(The default time for automatic break-off resulting from no packet transmissions is five minutes).

This function enables the PPPoE dial connection to keep connected, and to automatically redial if the line is disconnected. It also enables a user to set up a time for redialing. The default is 30 seconds.

After the changes are completed, click

“Apply” to save the configuration, or click “Cancel" to leave without making any change.

PPTP

This option is for the PPTP time counting system. Input the user’s connection name and password issued by ISP, and use the built-in PPTP software to connect with the Internet.

22

Enterprise Multi-WAN VPN QoS Router

WAN IP Address:

Subnet Mask:

Default Gateway

Address:

User Name:

Password:

This option is to configure a static IP address. The IP address to be configured could be one issued by ISP. (The IP address is usually provided by the ISP when the PC is installed. Contact ISP for relevant information).

Input the subnet mask of the static IP address issued by ISP, such as:

Issued eight static IP addresses: 255.255.255.248

Issued 16 static IP addresses: 255.255.255.240

Input the default gateway of the static IP address issued by ISP. For ADSL users, it is usually an ATU-R IP address.

Input the user name issued by ISP.

Input the password issued by ISP.

23

Connect on

Demand:

Keep Alive:

Enterprise Multi-WAN VPN QoS Router

This function enables the auto-dialing function to be used for a PPTP dial connection. When the client port attempts to connect with the Internet, the device will automatically connect with the default ISP auto dial connection; when the network has been idle for a period of time, the system will break the connection automatically. (The default time for automatic break off when no packets have been transmitted is five minutes).

This function enables the PPTP dial connection to redial automatically when the connection has been disconnected. Users can set up the redialing time. The default is 30 seconds.

After the changes are completed, click

“Apply” to save the configuration, or click “Cancel" to leave without making any changes.

Transparent Bridge

If all Intranet IP addresses are applied as Internet IP addresses

, and users don’t want to substitute private network IP addresses for all Intranet IP addresses (ex. 192.168.1.X), this function will enable users to integrate existing networks without changing the original structure. Select the Transparent Bridge mode for the WAN connection mode. In this way, users will be able to connect normally with the Internet while keeping the original Internet IP addresses in Intranet IP configuration.

If there are two WANs configured, users still can select Transparent Bridge mode for WAN connection mode, and load balancing will be achieved as usual.

24

Enterprise Multi-WAN VPN QoS Router

WAN IP Address:

Subnet Mask

Default Gateway

Address

DNS Server

Internal LAN IP Range

Input one of the static IP addresses issued by ISP.

Input the subnet mask of the static IP address issued by ISP, such as:

Issued eight static IP addresses: 255.255.255.248 Issued 16 static IP addresses: 255.255.255.240

Input the default gateway of the static IP address issued by ISP. For

ADSL users, it is usually an ATU-R IP address.

Input the DNS IP address set by ISP. At least one IP group should be input. The maximum acceptable is two IP groups.

Input the available IP range issued by ISP. If ISP issued two discontinuous IP address ranges, users can input them into Internal

LAN IP Range 1 and Internal LAN IP Range 2 respectively.

After the changes are completed, click

“Apply” to save the configuration, or click “Cancel" to leave without making any changes.

DMZ Setting

For some network environments, an independent DMZ port may be required to set up externally

25

Enterprise Multi-WAN VPN QoS Router

connected servers such as WEB and Mail servers. Therefore, the device supports a set of independent DMZ ports for users to set up connections for servers with real IP addresses. The DMZ ports act as bridges between the Internet and LANs.

IP address: Indicates the current default static IP address.

Config.: Indicates an advanced configuration modification: Click Edit to enter the advanced configuration page.

The DMZ configuration can be classified by Subnet and Range:

Subnet:

The DMZ and WAN located in different Subnets

For example: If the ISP issued 16 real IP addresses: 220.243.230.1-16 with Mask 255.255.255.240, users have to separate the 16 IP addresses into two groups: 220.243.230.1-8 with Mask 255.255.255.248, and 220.243.230.9-16 with Mask 255.255.255.248 and then set the device and the gateway in the same group with the other group in the DMZ.

Range:

DMZ and WAN within same Subnet

26

Enterprise Multi-WAN VPN QoS Router

IP Range: Input the IP range located at the DMZ port.

After the changes are completed, click

“Apply” to save the configuration, or click “Cancel" to leave without making any changes.

27

6.2 Multi- WAN Setting

6.2.1 Load Balance Mode

Enterprise Multi-WAN VPN QoS Router

Auto Load Balance Mode

When Auto Load Balance mode is selected, the device will use sessions or IP and the WAN bandwidth automatically allocate connections to achieve load balancing for external connections. The network bandwidth is set by what users input for it. For example, if the upload bandwidth of both WANs is 512Kbit/sec, the automatic load ratio will be 1:1; if one of the upload bandwidths is 1024Kbit/sec while the other is 512Kbit/sec, the automatic load ratio will be 2:1. Therefore, to ensure that the device can balance the actual network load, please input real upload and download bandwidths.

Session Balance:

If “By Session” is selected, the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance.

IP Session Balance:

If “By IP” is selected, the WAN bandwidth will automatically allocate connections based on IP amount to achieve network load balance.

Note!

For either session balancing or IP connection balancing, collocation with Protocol Binding will provide a more flexible application for bandwidth. Users can assign a specific Intranet IP to go through a specific service provider for connection, or assign an IP for a specific destination to go through the WAN users assign to connect with the Internet.

For example, if users want to assign IP 192.168.1.100 to go through WAN 1 when connecting with the Internet, or assign all Intranet IP to go through WAN 2 when connecting with servers with port 80, or assign all Intranet IP to go through WAN 1 when connecting with IP 211.1.1.1, users can do that by configuring “Protocol Binding”.

28

Enterprise Multi-WAN VPN QoS Router

Attention! When the Auto Load Balance mode is collocated with Protocol Binding, only IP addresses or servers that are configured in the connection rule will follow the rule for external connections; those which are not configured in the rule will still follow the device Auto Load Balance system.

Please refer to the explanations in 6.2.3 Configuring Protocol Binding for setting up Protocol

Binding and for examples of collocating router modes with Protocol Binding.

Specify WAN Binding Mode

This mode enables users to assign specific intranet IP addresses, destination application service ports or destination IP addresses to go through an assigned WAN for external connection. After being assigned, the specific WAN will only support those assigned Intranet IP addresses, specific destination application service ports, or specific destination IP addresses. Intranet IP, specific destination application service ports and specific destination IP that is not configured under the rules will go through other WANs for external connection. For unassigned WANs, users can select Load Balance mode and select session or IP for load balancing.

Session Balance

: If “By Session” is selected, the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance.

IP Balance

: If “By IP” is selected, the WAN bandwidth will automatically allocate connections based on the number of IP addresses to achieve network load balance.

Note!

Only when a device assignment is collocated with Protocol Binding can the balancing function be brought into full play. For example, an assignment requiring all Intranet IP addresses to go through WAN 1 when connecting with service port 80, or go through WAN 1 when connecting with

IP 211.1.1.1, must be set up in the Protocol Binding Configuration.

Attention: When assigning mode is selected, as in the above example, the IP(s) or service provider(s) configured in the connection rule will follow the rule for external connections, but those which are not configured in the rule will still follow the device Load Balance system to go through other WAN ports to connect with the Internet.

Please refer to the explanations in 6.2.3 Configuring Protocol Binding for setting up Protocol

Binding and for examples of collocating router mode with Protocol Binding.

29

Enterprise Multi-WAN VPN QoS Router

Strategy Routing Mode

If strategy Routing is selected, the device will automatically allocate external connections based on routing policy (Division of traffic between Telecom and Netcom is to be used in China) embedded in the device.

All you have to do is to select the WAN (or WAN group) which is connected with Netcom; the device will then automatically dispatch the traffic for Netcom through that WAN to connect with the Internet and dispatch traffic for Telecom to go through the WAN connected with Telecom to the Internet accordingly. In this way, the traffic for Netcom and Telecom can be divided.

Set WAN Grouping:

If more than one WAN is connected with Netcom, to apply a similar division of traffic policy to these

WANs, a combination for the WANs must be made. Click “Set WAN Grouping”; an interactive window as shown in the figure below will be displayed.

Name:

Interface:

Add To List:

To define a name for the WAN grouping in the box, such as

“Education” etc. The name is for recognizing different WAN groups.

Check the boxes for the WANs to be added into this combination.

To add a WAN group to the grouping list.

30

Enterprise Multi-WAN VPN QoS Router

Delete selected

Item:

Apply:

Close:

To remove selected WANs from the WAN grouping.

Click “Apply” to save the modification.

Click “Cancel” to cancel the modification. This only works before

“Apply” is clicked.

After the configuration is completed, in the China Netcom Policy window users can select WANs in combination to connect with Netcom.

Import Strategy:

A division of traffic policy c an be defined by users too. In the “Import Strategy” window, select the WAN or

WAN group (ex. WAN 1) to be assigned and click the “Import IP Range” button; the dialogue box for document importation will be displayed accordingly. A policy document is an editable text document. It may contain a destination IP users designated. After the path for document importation has been selected, click “Import”, and then at the bottom of the configuration window click “Apply”. The device will then dispatch the traffic to the assigned destination IP through the WAN (ex. WAN 1) or WAN grouping users designated to the Internet.

To build a policy document users can use a text-based editor, such as Notepad, which is included with

Windows system. Follow the text format in the figure below to key in the destination IP addresses users want to assign. For example, if the destination IP address range users want to designate is 140.115.1.1 ~

140.115.1.255, key in 140.115.1.1 ~ 140.115.1.255 in Notepad. The next destination IP address range should be keyed in the next line. Attention! Even if only one destination IP address is to be assigned, it should follow the same format. For example, if the destination IP address is 210.66.161.54, it should be keyed in as

31

Enterprise Multi-WAN VPN QoS Router

210.66.161.54~210.66.161.54. After the document has been saved (the extension file name is .txt), users can import the IP range of self-defined strategy.

Note!

China Netcom strategy and self-defined strategy can coexist. However, if a destination IP is assigned by both China Netcom strategy and self-defined strategy,

China Netcom strategy will take priority. In other words, traffic to that destination IP will be transmitted through the WAN (or WAN group) under China Netcom strategy.

6.2.2 Network Service Detection

This is a detection system for network external services. If this option is selected, information such

Retry” or “Retry Timeout” will be displayed. If two WANs are used for external connection, be sure to activate the NSD system, so as to avoid any unwanted break caused by the device misjudgment of the overload traffic for the WAN.

32

Enterprise Multi-WAN VPN QoS Router

Interface:

Retry:

Retry Timeout:

When Fail:

Select the WAN Port that enables Network Service Detection.

This selects the retry times for network service detection. The default is five times. If there is no feedback from the Internet in the configured

“Retry Times", it will be judged as “External Connection Disconnected”.

Delay time for external connection detection latency. The default is 30 seconds. After the retry timeout, external service detection will restart.

(1) Generate the Error Condition in the System Log: If an ISP connection failure is detected, an error message will be recorded in the System Log. This line will not be removed; therefore, the some of the users on this line will not have normal connections.

This option is suitable under the condition that one of the WAN connections has failed; the traffic going through this WAN to the destination IP cannot shift to another WAN to reach the destination.

For example, if users want the traffic to 10.0.0.1 ~ 10.254.254.254 to go only through WAN1, while WAN2 is not to support these destinations, users should select this option. When the WAN1 connection is disconnected, packets for 10.0.0.1~10.254.254.254 cannot be transmitted through WAN 2, and there is no need to remove the connection when WAN 1 is disconnected.

(2) Keep System Log and Remove the Connection: If an ISP

33

Enterprise Multi-WAN VPN QoS Router

connection failure is detected, no error message will be recorded in the System Log. The packet transmitted through this WAN will be shifted to the other WAN automatically, and be shifted back again when the connection for the original WAN is repaired and reconnected.

This option is suitable when one of the WAN connections fails and the traffic going through this WAN to the destination IP should go through the other WAN to reach the destination. In this way, when any of the

WAN connections is broken, other WANs can serve as a backup; traffic can be shifted to a WAN that is still connected.

Detecting Feedback Servers:

Default Gateway:

The local default communication gateway location, such as the IP address of an ADSL router, will be input automatically by the device.

Therefore, users just need to check the option if this function is needed.

Attention! Some gateways of an ADSL network will not affect packet detection. If users have an optical fiber box, or the IP issued by ISP is a public IP and the gateway is located at the port of the net café rather than at the IP provider’s port, do not activate this option.

This is the detected location for the ISP port, such as the DNS IP

ISP Host: address of ISP. When configuring an IP address for this function, make sure this IP is capable of receiving feedback stably and speedily. (Please input the DNS IP of the ISP port)

This is the detected location for the remote Network Segment. This

Remote Host:

Remote Host IP should better be capable of receiving feedback stably and speedily. (Please input the DNS IP of the ISP port).

DNS Lookup Host:

This is the detect location for DNS. (Only a web address such as www.google.

com is acceptable here. Do not input an IP address.) In addition, do not input the same web address in this box for two different

WANs.

Note!

In the load balance mode for Assigned Routing, the first WAN port (WAN1) will be saved for the traffic of the IP addresses or the application service ports that are not assigned to other WANs (WAN2,

34

Enterprise Multi-WAN VPN QoS Router

WAN3, and WAN4). Therefore, in this mode, we recommend assigning one of the connections to the first WAN. When other WANs (WAN2, WAN3, or WAN4) are broken and connection error remove

(Remove the Connection) has been selected for the connection detection system, traffic will be shifted to the first WAN (WAN1). In addition, if the first WAN (WAN1) is broken, the traffic will be shifted to other

WANs in turn. For example, the traffic will be shifted to WAN2 first; if WAN2 is broken too, the traffic will be shifted to WAN3, and so on.

6.2.3 Protocol Binding

Bandwidth Configuration

When Auto Load Balance mode is selected, the device will select sessions or IP and the WAN bandwidth will automatically allocate connections to achieve load balancing for external connections. The network bandwidth is set by what users input for it. For example, if the upload bandwidth of both WANs is 512Kbit/sec, the automatic load ratio will be 1:1; if one of the upload bandwidths is 1024Kbit/sec, while the other is

512Kbit/sec, the automatic load ratio will be 2:1. Therefore, to ensure that the device can balance the actual network load, please input real upload and download bandwidths. The section refers to QoS configuration.

Therefore, it should be set in QoS page. Please refer to 8.1 QoS bandwidth configuration.

Protocol Binding

Users can define specific IP addresses or specific application service ports to go through a user-assigned

WAN for external connections. For any other unassigned IP addresses and services, WAN load balancing will still be carried out.

Note!

In the load balance mode of Assigned Routing, the first WAN (WAN1) cannot be assigned. It is to be saved for the IP addresses and the application Service Ports that are not assigned to other WANs

(WAN2, WAN3, and WAN4) for external connections. In other words, the first WAN (WAN1) cannot be configured with the Protocol Binding rule. This is to avoid a condition where all WANs are assigned to specific Intranet IP or Service Ports and destination IP, no more WAN ports will be available for other IP

35

addresses and Service Ports.

Enterprise Multi-WAN VPN QoS Router

Service:

Source IP:

This is to select the Binding Service Port to be activated. The default (such as ALL-TCP&UDP 0~65535, WWW 80~80, FTP 21 to 21, etc.) can be selected from the pull-down option list. The default Service is All 0~65535.

Option List for Service Management: Click the button to enter the Service

Port configuration page to add or remove default Service Ports on the option list.

Users can assign packets of specific Intranet virtual IP to go through a specific WAN port for external connection. In the boxes here, input the

Intranet virtual IP address range; for example, if 192.168.1.100~150 is input, the binding range will be 100~150. If only specific Service Ports need to be designated, while specific IP designation is not necessary, input “0” in

36

Destination IP:

Interface:

Enable:

Add To List:

Delete selected application:

Moving Up &

Down:

To activate the rule.

To add this rule to the list.

Enterprise Multi-WAN VPN QoS Router

the IP boxes.

In the boxes, input an external static IP address. For example, if connections to destination IP address 210.11.1.1 are to be restricted to

WAN1, the external static IP address 210.1.1.1 ~ 210.1.1.1 should be input.

If a range of destinations is to be assigned, input the range such as

210.11.1.1 ~ 210.11.255.254. This means the Class B Network Segment of

210.11.x.x will be restricted to a specific WAN. If only specific Service Ports need to be designated, while a specific IP destination assignment is not required, input “0” into the IP boxes.

Select the WAN for which users want to set up the binding rule.

To remove the rules selected from the Service List.

The priority for rule execution depends on the rule order in the list. A rule located at the top will be executed prior to those located below it. Users can arrange the order according to their priorities.

Note!

The rules configured in Protocol Binding will be executed by the device according to their priorities too. The higher up on the list, the higher the priority of execution.

Show Priority

Click the “Show Table” button. A dialogue box as shown in the following figure will be displayed. Users can choose to sort the list by priorities or by interface. Click “Refresh” and the page will be refreshed; click

“Close” and the dialogue box will be closed.

37

Enterprise Multi-WAN VPN QoS Router

Add or Remove Service Port

If the Service Port users want to activate is not in the list, users can add or remove service ports from

“Service Management” to arrange the list, as described in the following:

Service Name:

Protocol:

Port range:

Add To List:

Delete selected

service:

Apply:

Cancel:

Exit:

In this box, input the name of the Service Port which users want to activate, such as BT, etc.

This option list is for selecting a packet format, such as TCP or

UDP for the Service Ports users want to activate.

In the boxes, input the range of Service Ports users want to add.

Click the button to add the configuration into the Services List.

Users can add up to 100 services into the list.

To remove the selected activated Services.

Click the “Apply” button to save the modification.

Click the

“Cancel” button to cancel the modification. This only works before

“Apply” is clicked.

To quit this configuration window.

38

Enterprise Multi-WAN VPN QoS Router

Auto Load Balancing mode when enabled

The collocation of the Auto Load Balance Mode and the Auto Load Mode will enable more flexible use of bandwidth. Users can assign specific Intranet IP addresses to specific destination application service ports or assign specific destination IP addresses to a WAN users choose for external connections.

Example 1:How do I set up Auto Load Balance Mode to assign the Intranet IP 192.168.1.100 to WAN2 for the

Internet?

As in the figure below, select “All Traffic” from the pull-down option list “Service”, and then in the boxes of “Source IP” input the source IP address “192.168.1.100” to “100”. Retain the original numbers

“0.0.0.0” in the boxes of “Destination IP” (which means to include all Internet IP addresses). Select

WAN2 from the pulldown option list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode.

Example 2:How do I set up Auto Load Balance Mode to keep Intranet IP 192.168.1.150 ~ 200 from going through WAN2 when the destination port is Port 80?

As in the figure below, select “HTTP [TCP/80~80]” from the pull-down option list “Service”, and

39

Enterprise Multi-WAN VPN QoS Router

then in the boxes for “Source IP” input “192.168.1.150” to “200”. Retain the original numbers “0.0.0.0” in the boxes of “Destination IP” (which means to include all Internet IP addresses). Select WAN2 from the pulldown option list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode.

Example 3:How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going through

WAN2 when the destination port is Port 80 and keep all other services from going through WAN1?

As in the figure below, there are two rules to be configured. The fi rst rule: select “HTTP

[TCP/80~80]” from the pull-down option list “Service”, and then in the boxes of Source IP input

“192.168.1.0” to “0” (which means to include all Intranet IP addresses). Retain the original numbers

“0.0.0.0” in the boxes of “Destination IP” (Which means to include all Internet IP addresses). Select

WAN2 from the pulldown option list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode. The device will transmit packets to Port 80 through WAN2. However, with only the above rule, packets that do not go to Port 80 may be transmitted through WAN2; therefore, a second rule is necessary. The second rule: Select “All Ports [TCP&UDP/1~65535]” from the pulldown option list “Service”, and then input “192.168.1.2 ~ 254” in the boxes of “Source IP”. Retain the original numbers “0.0.0.0” in the boxes of “Destination IP” (which means to include all Internet IP addresses). Select WAN1 from the pulldown option list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode. The device will transmit packets that are not going to Port 80 to the Internet through WAN1.

40

Enterprise Multi-WAN VPN QoS Router

Configuring “Assigned Routing Mode” for load Balance:

IP Group: This function allows users to assign packets from specific Intranet IP addresses or to specific destination Service Ports and to specific destination IP addresses through an assigned WAN to the Internet. After being assigned, the specific WAN will only support those assigned Intranet IP addresses, destination Service Ports, or destination IP addresses. Those which are not configured will go through other WANs for external connection. Only when this mode is collocated with “Assigned

Routing” can it bring the function into full play.

Example 1:How do I set up the Assigned Routing Mode to keep all Intranet IP addresses from going through WAN2 when the destination is Port 80, and keep all other services from going through WAN1?

As in the figure below, select “HTTP[TCP/80~80]” from the pull-down option list “Service”, and then in the boxes of “Source IP” input “192.168.1.0 ~ 0” (which means to include all Intranet IP addresses). Retain the original numbers “0.0.0.0” in the boxes of “Destination IP” (Which means to include all Internet IP addresses). Select WAN2 from the pulldown option list “Interface”, and then click

“Enable”. Finally, click “Add New” and the rule will be added to the mode. After the rule is set up, only packets that go to Port 80 will be transmitted through WAN2, while other traffics will be transmitted through WAN1.

41

Enterprise Multi-WAN VPN QoS Router

Example 2:How do I configure Protocol Binding to keep traffic from all Intranet IP addresses from going through WAN2 when the destinations are IP 211.1.1.1 ~ 211.254.254.254 as well as the whole Class A group of 60.1.1.1 ~ 60.254.254.254, while traffic to other destinations goes through WAN1?

As in the following figure, there are two rules to be configured. The first rule: Select “All Port

[TCP&UDP/1~65535]” from the pull-down option list “Service”, and then in the boxes of “Source IP” input “192.168.1.0 ~ 0” (which means to include all Intranet IP addresses). In the boxes for “Destination

IP” input “211.1.1.1 ~ 211.254.254.254”. Select WAN2 from the pull-down option list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode. The second rule:

Select “All Port [TCP&UDP/1~65535]” from the pull-down option list “Service”, and then in the boxes of

“Source IP” input “192.168.1.0 ~ 0” (which means to include all Intranet IP addresses). In the boxes of

“Destination IP” input “211.1.1.1 ~ 60,254,254,254”. Select WAN2 from the pull-down option list

“Interface”, and then click “Enable”. Finally, click “Add New”, and the rule will be added to the mode.

After the rule has been set up, all traffic that is not going to the assigned destinations will only be transmitted through WAN1.

42

Enterprise Multi-WAN VPN QoS Router

43

Enterprise Multi-WAN VPN QoS Router

VII. Intranet Configuration

This chapter introduces how to configure ports and understand how to configure intranet IP addresses.

7.1 Setup

Through the device, users can easily manage the setup for WAN ports, LAN ports and the DMZ port by choosing the number of ports, speed, priority, duplex and enable/disable the auto-negotiation feature for connection setting of each port.

44

Enterprise Multi-WAN VPN QoS Router

Mirror Port:Users can configure LAN 1 as mirror port by choosing

“Enable Port 1 as Mirror Port”. All the traffic from LAN to WAN will be copied to mirror port. Administrator can control or filter the traffic through mirror port. Once this function is enabled, LAN 1 will be shown as Mirror Port in Physical Port Status, Home page.

45

Enterprise Multi-WAN VPN QoS Router

Disabled

Priority

Speed

Duplex Status

Auto Neg.

VLAN

VLAN All

This feature allows users turn on/off the Ethernet port. If selected, the

Ethernet port will be shut down immediately and no connection can be made. The default value is "on".

This feature allows users to set the high/low priority of the packet delivery for the Ethernet port. If it is set as High, the port has the first priority to deliver the packet. The default value is “Normal”.

This feature allows users to select the network hardware connection speed for the Ethernet port. The options are 10Mbps and 100Mbps.

This feature allows users to select the network hardware connection speed working mode for the Ethernet. The options are full duplex and half duplex.

The Auto-Negotiation mode can enable each port to automatically adjust and gather the connection speed and duplex mode. Therefore, if Enabled

Auto-Neg. selected, the ports setup will be done without any manual setting by administrators.

This feature allows administrators to set the LAN port to be one or more disconnected network sessions. All of them will be able to log on to the

Internet through the device.

Members in the same network session (within the same VLAN) can see and communicate with each other. Members in different VLAN will not know the existence of other members.

Set VLAN All port to be the public area of VLAN so that it can be connected to other VLAN networks. A server should be constructed for the intranet so that all VLAN group can visit this server. Set one of the network ports as

VLAN All. Connect the server to VLAN All so that computers of different

VLAN groups can be connected to this server. Moreover, the port where the administrator locates must be set as VLAN All so that it can be connected to the entire network to facilitate network management.

46

7.2 Port Status

Enterprise Multi-WAN VPN QoS Router

Summary:

There are Network Connection Type, Interface, Link Status (Up/Down), Port Activity (Port Enabled),

Priority Setting (High or Normal), Speed Status (10Mbps or 100Mbps or 1000Mbps), Duplex Status (half duplex or full duplex), Auto Neg. (Enabled/Disabled), and VLAN.

Statistics:

The packet data of this specific port will be displayed. Data include receive/ transmit packet count,

47

Enterprise Multi-WAN VPN QoS Router

receive/ transmit packet Byte count and error packet count. Users may press the refresh button to update all real-time messages.

48

Enterprise Multi-WAN VPN QoS Router

7.3 IP/ DHCP

With an embedded DHCP server, it supports automatic IP assignation for LAN computers. (This function is similar to the DHCP service in NT servers.) It benefits users by freeing them from the inconvenience of recording and configuring IP addresses for each PC respectively. When a computer is turned on, it will acquire an IP address from the device automatically. This function is to make management easier.

49

Enterprise Multi-WAN VPN QoS Router

Dynamic IP:

Client lease Time Check the option to activate the DHCP server automatic IP lease function. If the function is activated, all PCs will be able to acquire IP automatically. Otherwise, users should configure static virtual IP for each

PC individually.

Range Start

Range End

This is to set up a lease time for the IP address which is acquired by a

PC. The default is 1440 minutes (a day). Users can change it according to their needs. The time unit is minute.

This is an initial IP automatically leased by DHCP. It means DHCP will start the lease from this IP. The default initial IP is 192.168.1.100.

50

Enterprise Multi-WAN VPN QoS Router

DNS (Domain Name Service):

This is for checking the DNS from which an IP address has been leased to a PC port. Input the IP address of this server directly.

DNS (Required) 1

DNS (Optional) 2

WINS:

Input the IP address of the DNS server.

Input the IP address of the DNS server.

If there is a WIN server in the network, users can input the IP address of that server directly.

WINS Server

Apply

Cancel

Input the IP address of WINS.

Click

Click

“Apply” to save the network configuration modification.

“Cancel" to leave without making any changes.

51

Enterprise Multi-WAN VPN QoS Router

7.4 DHCP Status

This is an indication list of the current status and setup record of the DHCP server. The indications are for the administrator’s reference when a network modification is needed.

DHCP Server

Dynamic IP Used

Static IP Used

DHCP Available

Total

Host Name

This is the current DHCP IP.

The amount of dynamic IP leased by DHCP.

The amount of static IP assigned by DHCP.

The amount of IP still available in the DHCP server.

The total IP which the DHCP server is configured to lease.

The name of the current computer.

52

IP Address

MAC Address

Client Lease Time

Delete

Enterprise Multi-WAN VPN QoS Router

The IP address acquired by the current computer.

The actual MAC network location of the current computer.

The lease time of the IP released by DHCP.

Remove a record of an IP lease.

53

Enterprise Multi-WAN VPN QoS Router

7.5 IP & MAC Binding

Administrators can apply IP & MAC Binding function to make sure that users can not add extra PCs for

Internet access or change private IP addresses.

There are two methods for setting up this function:

54

Enterprise Multi-WAN VPN QoS Router

Block MAC address not on the list

This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet access. When this method is applied, please fill out Static IP with 0.0.0.0, as the figure below:

IP & MAC Binding

55

Enterprise Multi-WAN VPN QoS Router

Static IP

MAC Address

There are two ways to input static IP:

1. If users want to set up a MAC address to acquire IP from

DHCP, but the IP need not be a specific assigned IP, input 0.0.0.0 in the boxes. The boxes cannot be left empty.

2. If users want DHCP to assign a static IP for a PC every single time, users should input the IP address users want to assign to this computer in the boxes. The server or PC which is to be bound will then acquire a static virtual IP whenever it restarts.

Input the static real MAC (the address on the network card) for the server or PC which is to be bound.

56

Enterprise Multi-WAN VPN QoS Router

Name

Enabled

Add to list

Delete selected item

Add

For distinguishing clients, input the name or address of the client that is to be bound. The maximum acceptable characters are 12.

Activate this configuration.

Add the configuration or modification to the list.

Remove the selected binding from the list.

Add new binding.

Block MAC address on the list with wrong IP address: When this option is activated, MAC addresses which are not included in the list will not be able to connect with the Internet.

Show New IP user:

This function can reduce administrator’s effort on checking MAC addresses one by one for the binding.

Furthermore, it is easy to make mistakes to fill out MAC addresses on the list manually. By checking this list, administrator can see all MAC addresses which have traffic and are not bound yet. Also, if administrators find that one specific bound MAC address is shown on the list, it means that the user changes the private IP address.

Name

Enabled

Apply

Select All

Refresh

Close

Input the name or address of the client that is to be bound. The maximum acceptable characters are 12.

Choose the item to be bound.

Activate the configuration.

Choose all items on the list for binding.

Refresh the list.

Close the list.

57

Enterprise Multi-WAN VPN QoS Router

7.6 IP Grouping

The function enables users to make the same configuration for a range of continuous IP addresses in the network. For example, if an IP range (192.168.1.100~192.168.1.110) has been assigned to a department of a company, we can bind all the IP addresses together and make an accessing rule configuration for them all at the same time, instead of configuring each IP respectively, which takes more time and is more prone to error.

IP Group

Add Group

Delete Group

Group Name

Select a group to which the modification is to be made.

Click Add Group to crate a new IP group.

Delete the chosen IP group.

Input or change the name for the group.

IP Address Input the assigned IP range.

Add to list

Add the configuration or modification to the list.

Delete selected item

Remove the selected binding from the list.

Apply

Click

“Apply” to save the network configuration modification

Cancel

Click

“Cancel" to leave without making any changes.

58

Enterprise Multi-WAN VPN QoS Router

VIII. QoS (Quality of Service)

QoS is an abbreviation for Quality of Service. The main function is to restrict bandwidth usage for some services and IP addresses to save bandwidth or provide priority to specific applications or services, and also to enable other users to share bandwidth, as well as to ensure stable and reliable network transmission. To maximize the bandwidth efficiency, network administrators should take account of the practical requirements of a company, a community, a building, or a café , etc., and modify bandwidth management according to the network environment, application processes or services.

59

8.1 Bandwidth Management

Enterprise Multi-WAN VPN QoS Router

8.1.1 The Maximum Bandwidth provided by ISP

In the boxes for WAN1 and WAN2 bandwidth, input the upstream and downstream bandwidth

60

Enterprise Multi-WAN VPN QoS Router

which users applied for from bandwidth supplier. The bandwidth QoS will make calculations according to the data users input. In other words, it will guarantee a minimum rate of upstream and downstream for each IP and Service Port based on the total actual bandwidth of WAN1 and WAN2. For example, if the upstream bandwidths of both WAN1 and WAN2 are 512Kbit/Sec, the total upstream bandwidth will be: WAN1 + WAN2 = 1024Kbit/Sec. Therefore, if there are 50 IP addresses in the Intranet, the minimum guaranteed upstream bandwidth for each IP would be 1024Kbit/50=20Kbit/Sec. Thus,

20Kbit/Sec can be input for “Mini. Rate” Downstream bandwidth can be calculated in the same way.

Attention!

The unit of calculation in this example is Kbit. Some software indicates the downstream/upstream speed with the unit KB. 1KB = 8Kbit.

8.1.2 QoS

To satisfy the bandwidth requirements of certain users, the device enables users to set up QoS: Rate

Control and Priority Control. Users can select only one of the above QoS choices.

Rate Control:

The network administrator can set up bandwidth or usage limitations for each IP or IP range according to the actual bandwidth. The network administrator can also set bandwidth control for certain Service

Ports. A guarantee bandwidth control for external connections can also be configured if there is an internal server.

61

Enterprise Multi-WAN VPN QoS Router

Interface

Service Port

Select on which WAN the QoS rule should be executed. It can be a single selection or multiple selections.

Select what bandwidth control is to be configured in the QoS rule. If the bandwidth for all services of each IP is to be controlled, select “All (TCP&UDP)

1~65535”. If only FTP uploads or downloads need to be controlled, select

“FTP Port 21~21”. Refer to the Default Service Port Number List.

62

Enterprise Multi-WAN VPN QoS Router

IP Address

Direction

This is to select which user is to be controlled. If only a single IP is to be restricted, input this IP address, such as “192.168.1.100 to 100”. The rule will control only the IP 192.168.1.100. If an IP range is to be controlled, input the range, such as “192.168.1.100 ~ 150”. The rule will control IP addresses from

192.168.1.100 to 150. If all Intranet users that connect with the device are to be controlled, input “0” in the boxes of IP address. This means all Intranet IP addresses will be restricted. QoS can also control the range of Class B.

Upstream: Means the upload bandwidth for Intranet IP.

Downstream: Means the download bandwidth for Intranet IP.

Server in LAN, Upstream: If a Server for external connection has been built in the device, this option is to control the bandwidth for the traffic coming from outside to this Server.

Server in LAN, Downstream: If there are web sites built in the Intranet, this option is to control the upload bandwidth for the connections from outside to this Server. For example, game servers have been built in many Internet cafés. This rule can be used to control the bandwidth for connections from

Min. & Max.

Rate (Kbit/Sec) outside to the game server of a café to update data. In this way, game players inside the café will not be affected.

The minimum bandwidth: The rule is to guarantee minimum available bandwidth.

The maximum bandwidth: This rule is to restrict maximum available bandwidth. The maximum bandwidth will not exceed the limit set up under this rule.

Attention! The unit of calculation used in this rule is Kbit. Some software indicates download/upload speed by the unit KB. 1KB = 8Kbit.

63

Enterprise Multi-WAN VPN QoS Router

Bandwidth sharing

Sharing total bandwidth with all IP addresses: If this option is selected, all IP addresses or Service Ports will share the bandwidth range (from minimum to maximum bandwidth).

Assign bandwidth for each IP address: If this option is selected, every IP or

Service Port in this range can have this bandwidth (minimum to maximum).

For example, If the rule is set for the IP of each PC, the IP of each PC will have the same bandwidth.

Attention: If “Share-Bandwidth” is selected, be aware of the actual usage conditions and avoid an improper configuration that might cause a malfunction of the network when the bandwidth is too small. For example, if users do not want an FTP to occupy too much bandwidth, users can select the

“Share-Bandwidth Mode”, so that no matter how much users use FTPs to download information, the total occupied bandwidth is fixed.

Enable

Activate the rule.

Add to list

Add this rule to the list.

Move up & Move

down

QoS rules will be executed from the bottom of the list to the top of the list. In other words, the lower down the list, the higher the priority of execution. Users can arrange the sequence according to their priorities. Usually the service ports which need to be restricted, such as BT, e-mule, etc., will be moved to the bottom of the list. The rules for certain IP addresses would then be moved upward.

Delete selected

items

Show Table

Remove the rules selected from the Service List.

Apply

Display all the Rate Control Rules users made for the bandwidth. Click

“Edit” to modify.

Click

“Apply” to save the configuration

Cancel

Click

“Cancel" to leave without making any change.

Show Table:

64

Enterprise Multi-WAN VPN QoS Router

8.2 Session control

Session management controls the acceptable maximum simultaneous sessions of Intranet PCs.

This function is very useful for managing connection quantity when P2P software such as BT, Thunder, or emule is used in the Intranet causing large numbers of sessions. Setting up proper limitations on sessions can effectively control the sessions created by P2P software. It will also have a limiting effect on bandwidth usage.

In addition, if any Intranet PC is attacked by a virus like Worm.Blaster and sends a huge number of session requests, session control will restrict that as well.

Session Control and Scheduling:

Disabled Disable Session Control function.

This option enables the restriction of maximum external sessions to each

Single IP cannot

exceed __ session

Intranet PC. When the number of external sessions reaches the limit, to allow new sessions to be built, some of the existing sessions must be closed. For example, when BT or P2P is being used to download information and the sessions exceed the limit, the user will be unable to connect with other services until either BT or P2P is closed.

65

Enterprise Multi-WAN VPN QoS Router

When single IP

exceed __

If this function is selected, when the user’s port session reach the limit, this user will not be able to make a new session for five minutes. Even if the previous session has been closed, new sessions cannot be made until the setting time ends.

Scheduling

If this function is selected, when the user’s port connections reach the limit, all the lines that this user is connected with will be removed, and the user will not be able to connect with the Internet for five minutes. New connections cannot be made until the delay time ends.

If “Always” is selected, the rule will be executed around the clock.

If “From…” is selected, the rule will be executed according to the

Apply

Cancel configured time range. For example, if the time control is from Monday to

Friday, 8:00am to 6:00pm, users can refer to the following figure to set up the rule.

Click

“Apply” to save the configuration.

Click

“Cancel" to leave without making any change.

Exempted Service Port or IP Address

66

Enterprise Multi-WAN VPN QoS Router

Service Port

Choose the service port.

IP Address

Input the IP address range or IP group.

Enabled

Activate the rule.

Add to list

Add this rule to the list.

Delete seleted item Remove the rules selected from the Service List.

Apply

Click

“Apply” to save the configuration.

Cancel

Click

“Cancel" to leave without making any change.

67

Enterprise Multi-WAN VPN QoS Router

8.3 Smart QoS

The smart QoS function enables the administrators to constrain the bandwidth occupied automatically without any configuring.

Enabled Smart Qos

When the usage of any WAN's bandwith is over than __ %, Enable Smart Qos(0:

Always Enabled)

Each IP's downstream bandwidth threshold(for all WAN)

If any IP's bandwith is over maximum threshold, its maximum bandwidth will remain

WAN1:__kbit/sec WAN2:__kbit/sec

WAN3:__kbit/sec WAN4:__kbit/sec

Enabled Penalty Mechanism

To activate the Smart QoS function.

When the usage of any WAN's bandwith is over than __

%, Smart QoS will be enabled. You can enter the needed value, the default is 60%.

Input the allowed maximum threshold.

If any IP's bandwith is over maximum threshold, the penalty mechanism will be activated. After being punished, its maximum upstream/downstream bandwidth will remain as a determined value.

To activate the penalty mechanism.

68

Enterprise Multi-WAN VPN QoS Router

IX. Firewall

This chapter introduces firewall general policy, access rule, and content filter settings to ensure network security.

9.1 General Policy

The firewall is enabled by default. If the firewall is set as disabled, features such as SPI, DoS, and outbound packet responses will be turned off automatically. Meanwhile, the remote management feature will be activated. The network access rules and content filter will be turned off.

Firewall This feature allows users to turn on/off the firewall.

69

Enterprise Multi-WAN VPN QoS Router

SPI (Stateful Packet

Inspection)

This enables the packet automatic authentication detection technology.

The Firewall operates mainly at the network layer. By executing the dynamic authentication for each connection, it will also perform an alarming function for application procedure. Meanwhile, the packet authentication firewall may decline the connections which use non-standard communication protocol.

DoS (Denial of

Service)

Block WAN request

This averts DoS attacks such as SYN Flooding, Smurf, LAND, Ping of

Death, IP Spoofing and so on.

If set as Enabled, then it will shut down outbound ICMP and abnormal packet responses in connection. If users try to ping the WAN IP from the external, this will not work because the default value is set as activated in order to decline the outbound responses.

Remote Management

To enter the device web- based UI by connecting to the remote Internet, this feature must be activated. In the field of remote browser IP, a valid external IP address (WAN IP) for the device should be filled in and the modifiable default control port should be adjusted (the default is set to

80, modifiable).

Multicast Pass

Through

There are many audio and visual streaming media on the network.

Broadcasting may allow the client end to receive this type of packet message format. This feature is off by default.

Prevent ARP Virus

Attack

This feature is designed to prevent the intranet from being attacked by

ARP spoofing, causing the connection failure of the PC. This ARP virus cheat mostly occurs in Internet cafes. When attacked, all the online computers disconnect immediately or some computers fail to go online.

Activating this feature may prevent the attack by this type of virus.

70

Advanced Setting

Enterprise Multi-WAN VPN QoS Router

Exempted Source IP

Packet Type: This device provides three types of data packet transmission: TCP-SYN-Flood, UDP-Flood and ICMP-Flood.

WAN Threshold: When all packet values from external attack or from single external IP attack reach the maximum amount (the default is

15000 packets/Sec and 2000 packets/Sec respectively), if these conditions above occurs, the IP will be blocked for 5 minutes ( the default is 5 minutes OBJ 176 ). Users can adjust the threshold value and the blocking duration to effectively deal with external attack. The threshold value should be adjusted from high to low.

LAN Threshold: When all packet values from internal attack or from single internal IP attack reach the maximum amount (the default is

15000 packets/Sec and 2000 packets/Sec respectively), if these conditions above occurs, the IP will be blocked for 5 minutes (the default is 5 minutes). Users can adjust the threshold value and the blocking duration to effectively deal with external attack. The threshold value should be adjusted from high to low.

Input the exempted source IP.

Exempted Dest. IP

Input the exempted Destination IP addresses.

71

Show Blocked IP

Enterprise Multi-WAN VPN QoS Router

Restricted WEB

Features

Don’t Block Java /

ActiveX / Cookies

Proxy to Trusted

Domain

Apply

Cancel

Show the blocked IP list and the remained blocked time.

It supports the block that is connected through: Java, Cookies, Active X, and HTTP Proxy access.

If this option is activated, users can add trusted network or IP address into the trust domain, and it will not block items such as Java/ActiveX/Cookies contained in the web pages from the trust domains.

Click

“Apply” to save the configuration.

Click

“Cancel" to leave without making any change.

72

Enterprise Multi-WAN VPN QoS Router

9.2 Restrict Application

Users can check QQ and the device will block the service users checked. However, to provide this service for certain IP address in the intranet, users may check the following item and then enter the specific IP address or IP address session to use the services which are checked above.

In addition, if Blocked QQ is activated, users can set the exempted QQ number list. Press

“Exempted QQ Number” button, and enter the QQ number into the exempted QQ number list.

73

Enterprise Multi-WAN VPN QoS Router

User Name

Exempted QQ Number

Add to list

Input the information of the QQ number, etc.

Input the number.

Add the number to the list.

Delete selected item

Delete the selected rule in the list.

74

Enterprise Multi-WAN VPN QoS Router

9.3 Access Rule

Users may turn on/off the setting to permit or forbid any packet to access internet. Users may select to set different network access rules: from internal to external or from external to internal. Users may set different packets for IP address and communication port numbers to filter Internet access rules.

Network access rule follows IP address, destination IP address, and IP communications protocol status to manage the network packet traffic and make sure whether their access is allowed by the firewall.

The device has a user-friendly network access regulatory tool. Users may define network access rules. They can select to enable/ disable the network so as to protect all internet access. The following describes the internet access rules:

 All traffic from the LAN to the WAN is allowed - by default.

 All traffic from the WAN to the LAN is denied - by default.

 All traffic from the LAN to the DMZ is allowed - by default.

 All traffic from the DMZ to the LAN is denied - by default.

 All traffic from the WAN to the DMZ is allowed - by default.

 All traffic from the DMZ to the WAN is allowed - by default.

Users may define access rules and do more than the default rules. However, the following four extra service items are always on and are not affected by other user-defined settings.

* HTTP Service (from LAN to Device) is on by default (for management)

* DHCP Service (from LAN to Device) is set to on by default (for the automatic IP retrieval)

* DNS Service (from LAN to Device) is on by default (for DNS service analysis)

* Ping Service (from LAN to Device) is on by default (for connection and test)

75

Enterprise Multi-WAN VPN QoS Router

In addition to the default rules, all the network access rules will be displayed as illustrated above. Users may follow or self- define the priority of each network access rule. The device will follow the rule priorities one by one, so please make sure the priority for all the rules can suit the setting rules.

Edit

Define the network access rule item

Delete

Remove the item.

Add New Rule

Create a new network access rule

Restore to Default Rule Restore all settings to the default values and delete all the self-defined settings.

76

9.3.2 Add New Access Rule

Enterprise Multi-WAN VPN QoS Router

Action Allow: Permits the pass of packets compliant with this control rule

Service

Log give permission.

Service Management If the service that users wish to manage does not exist in the drop-down menu, press

– Service Management to add the new service.

From the pop-up window, enter a service name and communications protocol and port, and then click the “Add to list” button to add the new service.

No Log: There will be no log record.

Create Log when matched: Event will be recorded in the log.

Source Interface

Deny: Prevents the pass of packets not compliant with this control rule

From the drop-down menu, select the service that users grant or do not

Source IP

Select the source port whether users are permitted or not (for example:

LAN, WAN1, WAN2 or Any). Select from the drop-down menu.

Select the source IP range (for example: Any, Single, Range, or preset IP group name). If Single or Range is selected, please enter a single IP address or an IP address within a session.

77

Dest. IP

Scheduling

Apply this rule

… to …

Day Control

Apply

Cancel

Enterprise Multi-WAN VPN QoS Router

Select the destination IP range (such as Any, Single, Range, or preset IP group name) If Single or Range is selected; please enter a single IP address or an IP address within a session.

Select

“Always” to apply the rule on a round-the-clock basis. Select

“from”, and the operation will run according to the defined time.

Select "Always" to apply the rule on a round-the-clock basis.

If “From” is selected, the activation time is introduced as below

This control rule has time limitation. The setting method is in 24-hour format, such as 08:00 ~ 18:00 (8 a.m. to 6 p.m.)

Everyday” means this period of time will be under control everyday. If users only certain days of a week should be under control, users may select the desired days directly.

Click

“Apply” to save the configuration.

Click

“Cancel" to leave without making any change.

78

Enterprise Multi-WAN VPN QoS Router

9.4 Content Filter

The device supports two webpage restriction modes: one is to block certain forbidden domains, and the other is to give access to certain web pages. Only one of these two modes can be selected.

Block Forbidden Domain

Fill in the complete website such as www.sex.com to have it blocked.

79

Enterprise Multi-WAN VPN QoS Router

Add

Add to list

Delete selected item

Enter the websites to be controlled such as www.playboy.com

Click ”Add to list” to create a new website to be controlled.

Click to select one or more controlled websites and click this option to delete.

80

Website Blocking by Keywords:

Enterprise Multi-WAN VPN QoS Router

Enabled Click to activate this feature. The default setting is disabled.

For example: If users enter the string ”sex”, any websites containing ”sex” will be blocked.

Enter keywords.

KeywordsOnly for English

Add to List

Delete selected item

Apply

Cancel

Add this new service item content to the list.

Delete the service item content from the list

Click “Apply” to save the modified parameters.

Click “Cancel” to cancel all the changes made to the parameters.

Accept Allowed Domains

In some companies or schools, employees and students are only allowed to access some specific websites. This is the purpose of the function.

81

Enterprise Multi-WAN VPN QoS Router

Enabled

Add

Add to list

Delete selected item

Activate the function

. The default setting is “Disabled.”

Input the allowed domain name, etc. www.google.com

Add the rule to list.

Users can select one or more rules and click to delete.

Content Filter Scheduling

Select

“Always” to apply the rule on a round-the-clock basis. Select “from”, and the operation will run according to the defined time. For example, if the control time runs from 8 a.m. to 6 p.m., Monday to

Friday, users may control the operation according to the following illustrated example.

82

Enterprise Multi-WAN VPN QoS Router

Always

Select

“Always” to apply the rule on a round-the-clock basis. Select “from”, and the operation will run according to the defined time.

…to…

Select "Always" to apply the rule on a round-the-clock basis.

If “From” is selected, the activation time is introduced as below

Day Control This control rule has time limitation. The setting method is in 24-hour format, such as

08:00 ~ 18:00 (8 a.m. to 6 p.m.)

83

X. VPN (Virtual Private Network)

10.1. VPN

Enterprise Multi-WAN VPN QoS Router

10.1.1. Display All VPN Summary

This VPN Summary displays the real-time data with regard to VPN status.

Detail: Push this button to display the following information with regard to all current VPN configurations to facilitate VPN connection management.

84

Enterprise Multi-WAN VPN QoS Router

Tunnel Status:

The following describes VPN Tunnel Status, the current status of VPN tunnel in detail:

Previous Page/Next

Page, Jump to __/__

Page, __ Entries Per

Page

Click Previous page or Next page to view the desired VPN tunnel page. Or users can select the page number directly to view all VPN tunnel statuses, such as 3, 5, 10, 20 or All.

Tunnel No.

Status

To set the embedded VPN feature, please select the tunnel number. It supports up to 300 IPSec VPN tunnel Setting (gateway to gateway as well as client to gateway).

Successful connection is indicated as-(Connected).

Failing hostname resolution is indicated as - (Hostname Resolution

Failed).

Resolving hostname is indicated as -(Resolving Hostname)

Waiting to be connected is indicated as - (Waiting for Connection).

If users select Manual setting for IPSec setup, the status message will display as “Manual” and there is no Tunnel test function available for this manual setting.

Name

Displays the current VPN tunnel connection name, such as XXX

Office. Users are well-advised to give them different names to avoid confusion should users have more than one tunnel settings.

Note: If this tunnel is to be connected to other VPN device (not this device), some device requires that the tunnel name is identical to the

85

Enterprise Multi-WAN VPN QoS Router

name of the host end to facilitate verification. This tunnel can thus be successfully enabled.

Phase2

Encrypt/Auth/Group

Displays settings such as encryption (DES/3DES), authentication

(MD5/SHA1) and Group (1/2/5).

If users select Manual setting for IPSec, Phase 2 DH group will not display.

Local Group

Remote Group

Remote Gateway

Displays the setting for VPN connection secure group of the local end.

Displays the setting for remote VPN connection secure group.

Control

Config

Set the IP address to connect the remote VPN device. Please set the

VPN device with a valid IP address or domain name.

Click

“Connect” to verify the tunnel status. The test result will be updated. To disconnect, click

“Disconnect” to stop the VPN connection.

Setting items include Edit and Delete icon.

Click on Edit to enter the setting items and users may change the settings. Click on the trash bin icon and all the tunnel settings will be deleted.

__ Tunnel(s) Enabled:

This displays how many tunnels are enabled and how many tunnels are set.

__ Tunnel(s) Defined:

86

Enterprise Multi-WAN VPN QoS Router

10.1.2. Add a New VPN Tunnel

The device supports Gateway to Gateway tunnel or Client to Gateway tunnel.

The VPN tunnel connections are done by 2 VPN devices via the Internet. When a new tunnel is added, the setting page for Gateway to Gateway or Client to Gateway will be displayed.

Gateway to Gateway:

Click “Add” to enter the setting page of Gateway to Gateway.

Client to Gateway:

Click “Add” to enter the setting page of Client to Gateway.

87

10.1.2.1. Gateway to Gateway Setting

Enterprise Multi-WAN VPN QoS Router

The following instructions will guide users to set a VPN tunnel between two devices.

Tunnel No. Set the embedded VPN feature, please select the Tunnel number.

Tunnel Name

Displays the current VPN tunnel connection name, such as XXX Office. Users are well-advised to give them different names to avoid confusion.

Note: If this tunnel is to be connected to the other VPN device, some device requires that the tunnel name is identical to the name of the host end to facilitate verification. This tunnel can thus be successfully enabled.

Interface From the pull-down menu, users can select the Interface for this VPN tunnel.

Enabled

Click to activate the VPN tunnel. This option is set to activate by default.

Afterwards, users may select to activate this tunnel feature.

Local Group Setup:

This Local Security Gateway Type must be identical with that of the remote type (Remote Security

Gateway Type).

88

Local Security

GatewayType

Enterprise Multi-WAN VPN QoS Router

This local gateway authentication type comes with five operation modes, which are:

IP only IP + Domain Name (FQDN) Authentication

IP + E-mail Addr. (USER FQDN) Authentication

Dynamic IP + Domain Name (FQDN) Authentication

Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

Dynamic IP address + Email address name

(1) IP only:

If users decide to use IP only, entering the IP address is the only way to gain access to this tunnel. The WAN IP address will be automatically filled into this space. Users don't need to do further settings.

(2) IP + Domain Name(FQDN) Authentication:

If users select IP + domain name type, please enter the domain name and IP address. The WAN IP address will be automatically filled into this space. Users don't need to do further settings. FQDN refers to the combination of host name and domain name and can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection.

(3) IP + E-mail Addr. (USER FQDN) Authentication.

If users select IP address and E-mail, enter the IP address and E-mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space. Users don't need to do further settings.

89

Enterprise Multi-WAN VPN QoS Router

(4) Dynamic IP + Domain Name(FQDN) Authentication:

If users use dynamic IP address to connect to the device, users may select this option to link to VPN. If the remote VPN gateway requires connection to the device for VPN connection, this device will start authentication and respond to this VPN tunnel connection; if users select this option to link to VPN, please enter the domain name.

(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

If users use dynamic IP address to connect to the device, users may select this option to connect to VPN without entering IP address.

When VPN Gateway requires for VPN connection, the device will start authentication and respond to VPN tunnel connection; If users select this option to link to VPN, enter E-Mail address to the empty field for

E-Mail authentication.

Local Security Group

Type

This option allows users to set the local VPN connection access type.

The following offers a few items for local settings. Please select and set appropriate parameters:

1. IP address

This option allows the only IP address which is entered to build the VPN tunnel.

Reference: When this VPN tunnel is connected, computers with the

IP address of 192.168.1.0 can establish connection.

90

Remote Group Setup:

Enterprise Multi-WAN VPN QoS Router

2. Subnet

This option allows local computers in this subnet can be connected to the VPN tunnel.

Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.

3. IP Range

This option allows connection only when IP address range which is entered after the VPN tunnel is connected.

Reference: When this VPN tunnel is connected, computers with the IP address of 192.168.1.0 ~254 can establish connection.

This remote gateway authentication type (Remote Security Gateway Type) must be identical to the remotely-connected local security gateway authentication type (Local Security Gateway Type).

Remote Security Gateway

Type

This remote gateway authentication type comes with five operation modes, which are:

IP only-Authentication by use of IP only

IP + Domain Name (FQDN) Authentication, -IP + Domain name

91

Enterprise Multi-WAN VPN QoS Router

IP + E-mail Addr. (USER FQDN) Authentication, -IP + Email address

Dynamic IP + Domain Name (FQDN) Authentication, -Dynamic IP address + Domain name

Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

Dynamic IP address + Email address name

(1) IP only:

If users select the IP Only type, entering this IP allows users to gain access to this tunnel.

If the IP address of the remote client is unknown, choose IP by DNS

Resolved, allowing DNS to translate IP address. When users finish the setting, the corresponding IP address will be displayed under the remote gateway of Summary.

(2) IP + Domain Name(FQDN) Authentication:

If users select IP + domain name, please enter IP address and the domain name to be verified. FQDN refers to the combination of host name and domain name. Users may enter any name that corresponds to the domain name of FQDN. This IP address and domain name must be identical to those of the remote VPN security gateway setting type to establish successful connection.

If the remote IP address is unknown, choose IP by DNS Resolved, allowing DNS to translate the IP address. This domain name must be available on the Internet. When users finish the setting, the corresponding IP address will be displayed under the remote gateway of Summary.

92

Enterprise Multi-WAN VPN QoS Router

(3) IP + E-mail Addr. (USER FQDN) Authentication:

If users select IP address and E-mail type, entering the IP address and the E-mail allows users to gain access to this tunnel.

If the remote IP address is unknown, choose IP by DNS Resolved, allowing DNS to translated the IP address. This domain name must be available on the Internet. When users finish the setting, the corresponding IP address will be displayed under the remote gateway of Summary.

(4) Dynamic IP + Domain Name(FQDN) Authentication:

If users use dynamic IP address to connect with the device, users may select the combination of the dynamic IP address, host name and domain name.

(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

If users use dynamic IP address to connect with the device, users may select this type to link to VPN. When the remote VPN gateway requires connection to facilitate VPN connection, the device will start authentication and respond to the VPN tunnel connection; Please enter the E-Mail to the empty space.

93

Enterprise Multi-WAN VPN QoS Router

Remote Security Group

Type

This option allows users to set the remote VPN connection access type. The following offers a few items for remote settings. Please select and set appropriate parameters:

(1) IP address

This option allows the only IP address which is entered to build the

VPN tunnel.

Reference: When this VPN tunnel is connected, computers with the

IP address of 192.168.2.1 can establish connection.

(2) Subnet

This option allows local computers in this subnet can be connected to the VPN tunnel.

Reference: When this VPN tunnel is connected, only computers with the session of 192.168.2.0 and with subnet mask as

255.255.255.0 can connect with remote VPN.

(3) IP Address Range

This option allows connection only when IP address range which is entered after the VPN tunnel is connected.

Reference: When this VPN channel is connected, computers with the IP address range between 192.168.2.1 and 192.168.1.254 can establish connection.

94

IPSec Setup

Enterprise Multi-WAN VPN QoS Router

Use IKE Protocol:

Click the shared key generated by IKE to encrypt and authenticate the remote user. If PFS (Perfect

Forward Secrecy) is enabled, the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication. When PFS is enabled, hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time.

Perfect Forward Secrecy: When users check the PFS option, don't forget to activate the PFS function of the VPN device and the VPN Client as well.

Phase 1/ Phase 2 DH Group: This option allows users to select Diffie-Hellman groups: Group

1/ Group 2/ Group 5.

Phase 1/ Phase 2 Encryption: This option allows users to set this VPN tunnel to use any encryption mode. Note that this parameter must be identical to that of the remote encryption parameter: DES (64-bit encryption mode), 3DES (128-bit encryption mode), AES (the standard of using security code to encrypt information). It supports 128-bit, 192-bit, and 256-bit encryption keys.

Phase 1/Phase 2 Authentication: This authentication option allows users to set this VPN tunnel to use any authentication mode. Note that this parameter must be identical to that of the

95

Enterprise Multi-WAN VPN QoS Router

remote authentication mode: “MD5” or “SHA1”.

Phase 1 SA Life Time: The life time for this exchange code is set to 28800 seconds (or 8hours) by default. This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security.

Phase2 SA Life Time: The life time for this exchange code is set to 3600 seconds (or 1hours) by default. This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security.

Preshared Key:For the Auto (IKE) option, enter a password of any digit or characters in the text of “Pre-shared Key” (the example here is set as test), and the system will automatically translate what users entered as exchange password and authentication mechanism during the VPN tunnel connection. This exchange password can be made up of up to 30 characters.

Advanced Setting- for IKE Protocol Only

The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is set to VPN operation mode. The connection is the same to most of the VPN devices.

● Aggressive Mode: This mode is mostly adopted by remote devices. The IP connection is designed to enhance the security control if dynamic IP is used for connection.

● Keep Alive: If this option is selected, VPN tunnel will keep this VPN connection. This is mostly used to connect the remote node of the branch office and headquarter or used for the remote dynamic IP address.

● NetBIOS Broadcast: If this option is selected, the connected VPN tunnel allows the passage of

NetBIOS broadcast packet. This facilitates the easy connection with other Microsoft network; however, the traffic using this VPN tunnel will increase.

● Dead Peer Detection (DPD): If this option is selected, the connected VPN tunnel will regularly

96

Enterprise Multi-WAN VPN QoS Router

transmit HELLO/ACK message packet to detect whether there is connection between the two ends of the VPN tunnel. If one end is disconnected, the device will disconnect the tunnel automatically and then create new connection. Users can define the transmission time for each

DPD message packet, and the default value is 10 seconds.

97

Enterprise Multi-WAN VPN QoS Router

10.1.2.2. Client to Gateway Setting

The following describes how an administrator builds a VPN tunnel between devices. Users can set this VPN tunnel to be used by one client or by a group of clients (Group VPN) at the client end. If it is used by a group of clients, the individual setting for remote clients can be reduced. Only one tunnel will be set and used by a group of clients, which allows easy setting.

(1) Situation in Tunnel:

Tunnel No.

Tunnel Name

Interface

Enabled

Set the embedded VPN feature, please select the Tunnel number.

Displays the current VPN tunnel connection name, such as XXX Office.

Users are well-advised to give them different names to avoid confusion.

Note: If this tunnel is to be connected to the other VPN device, some device requires that the tunnel name is identical to the name of the host end to facilitate verification. This tunnel can thus be successfully enabled.

Users may select which port to be the node for this VPN channel. They can be applied for VPN connections.

Click to Enable to activate the VPN tunnel. This option is set to Enable by default. After users set up, users may select to activate this tunnel feature.

98

Enterprise Multi-WAN VPN QoS Router

Local Group Setup

This local gateway authentication type (Local Security Gateway Type) must be identical with that of the remote type (Remote Security Gateway Type).

Local Security Gateway

Type

This local gateway authentication type comes with five operation modes, which are:

IP only - Authentication by the use of IP only

IP + Domain Name (FQDN) Authentication, -IP + Domain name

IP + E-mail Addr. (USER FQDN) Authentication,-IP + Email address

Dynamic IP + Domain Name (FQDN) Authentication, -Dynamic

IP address + Domain name

Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

Dynamic IP address + Email address name

(1) IP only:

If users decide to use IP only, entering the IP address is the only way to gain access to this tunnel. The WAN IP address will be automatically filled into this space. Users don't need to do further settings.

(2) IP + Domain Name(FQDN) Authentication:

If users select IP + domain name type, please enter the domain name and IP address. The WAN IP address will be automatically filled into this space. Users don't need to do further settings. FQDN refers to the combination of host name and domain name and can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection.

99

Enterprise Multi-WAN VPN QoS Router

(3) IP + E-mail Addr. (USER FQDN) Authentication.

If users select IP address and E-mail, enter the IP address and

E-mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space. Users don't need to do further settings.

(4) Dynamic IP + Domain Name(FQDN) Authentication:

If users use dynamic IP address to connect to the device, users may select this option to link to VPN. If the remote VPN gateway requires connection to the device for VPN connection, this device will start authentication and respond to this VPN tunnel connection; if users select this option to link to VPN, please enter the domain name.

(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

If users use dynamic IP address to connect to the device, users may select this option to connect to VPN without entering IP address.

When VPN Gateway requires for VPN connection, the device will start authentication and respond to VPN tunnel connection; if users select this option to link to VPN, enter E-Mail address to the empty field for E-Mail authentication.

Local Security Group

Type

This option allows users to set the local VPN connection access type. The following offers a few items for local settings. Please select and set appropriate parameters:

4. IP address

This option allows the only IP address which is entered to build the VPN tunnel.

100

Enterprise Multi-WAN VPN QoS Router

Reference: When this VPN tunnel is connected, computers with the

IP address of 192.168.1.0 can establish connection.

5. Subnet

This option allows local computers in this subnet to be connected to the VPN tunnel.

Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as

255.255.255.0 can connect with remote VPN.

6. IP Range

This option allows connection only when IP address range which is entered after the VPN tunnel is connected.

Reference: When this VPN tunnel is connected, computers with the

IP address of 192.168.1.0 ~254 can establish connection.

101

Remote Group Setup:

Enterprise Multi-WAN VPN QoS Router

This remote gateway authentication type (Remote Security Gateway Type) must be identical to the remotely-connected local security gateway authentication type (Local Security Gateway Type).

Remote Security Gateway

Type

This local gateway authentication type comes with five operation modes, which are:

IP only

IP + Domain Name (FQDN) Authentication

IP + E-mail Addr. (USER FQDN) Authentication Dynamic IP +

Domain Name (FQDN) Authentication

Dynamic IP + E-mail Addr. (USER FQDN) Authentication

(1) IP only:

If users decide to use IP only, entering the IP address is the only way to gain access to this tunnel. The WAN IP address will be automatically filled into this space. Users don't need to do further settings.

(2) IP + Domain Name(FQDN) Authentication:

If users select IP + domain name type, please enter the domain name and IP address. The WAN IP address will be automatically filled into this space. Users don't need to do further settings. FQDN refers to the combination of host name and domain name and can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain name must be identical to those of the VPN secure

102

Enterprise Multi-WAN VPN QoS Router

gateway setting type to establish successful connection.

(3) IP + E-mail Addr. (USER FQDN) Authentication.

If users select IP address and E-mail, enter the IP address and

E-mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space. Users don't need to do further settings.

(4) Dynamic IP + Domain Name(FQDN) Authentication:

If users use dynamic IP address to connect to the device, users may select this option to link to VPN. If the remote VPN gateway requires connection to the device for VPN connection, this device will start authentication and respond to this VPN tunnel connection; if users select this option to link to VPN, please enter the domain name.

(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.

If users use dynamic IP address to connect to the device, users may select this option to connect to VPN without entering IP address.

When VPN Gateway requires for VPN connection, the device will start authentication and respond to VPN tunnel connection; if users select this option to link to VPN, enter E-Mail address to the empty field for E-Mail authentication.

103

IPSec Setup

Enterprise Multi-WAN VPN QoS Router

IKE Protocol:

Click the shared key generated by IKE to encrypt and authenticate the remote user. If PFS (Perfect

Forward Secrecy) is enabled, the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication. When PFS is enabled, hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time.

Perfect Forward Secrecy: When users check the PFS option, don't forget to activate the PFS function of the VPN device and the VPN Client as well.

Phase 1/ Phase 2 DH Group: This option allows users to select Diffie-Hellman groups: Group

1/ Group 2/ Group 5.

Phase 1/ Phase 2 Encryption: This option allows users to set this VPN tunnel to use any encryption mode. Note that this parameter must be identical to that of the remote encryption parameter: DES (64-bit encryption mode), 3DES (128-bit encryption mode), AES (the standard of using security code to encrypt information). It supports 128-bit, 192-bit, and 256-bit encryption keys.

Phase 1/Phase 2 Authentication: This authentication option allows users to set this VPN tunnel to use any authentication mode. Note that this parameter must be identical to that of the

104

Enterprise Multi-WAN VPN QoS Router

remote authentication mode: “MD5” or “SHA1”.

Phase 1 SA Life Time: The life time for this exchange code is set to 28800 seconds (or 8hours) by default. This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security.

Phase2 SA Life Time: The life time for this exchange code is set to 3600 seconds (or 1hours) by default. This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security.

Preshared Key:For the Auto (IKE) option, enter a password of any digit or characters in the text of “Pre-shared Key” (the example here is set as test), and the system will automatically translate what users entered as exchange password and authentication mechanism during the VPN tunnel connection. This exchange password can be made up of up to 30 characters.

Advanced Setting- for IKE Preshareed Key Only

The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is set to VPN operation mode. The connection is the same to most of the VPN devices.

● Aggressive Mode: This mode is mostly adopted by remote devices. The IP connection is designed to enhance the security control if dynamic IP is used for connection.

● Keep Alive: If this option is selected, VPN tunnel will keep this VPN connection. This is mostly used to connect the remote node of the branch office and headquarter or used for the remote dynamic IP address.

● NetBIOS Broadcast: If this option is selected, the connected VPN tunnel allows the passage of

NetBIOS broadcast packet. This facilitates the easy connection with other Microsoft network; however, the traffic using this VPN tunnel will increase.

105

Enterprise Multi-WAN VPN QoS Router

Dead Peer Detection (DPD): If this option is selected, the connected VPN tunnel will regularly transmit HELLO/ACK message packet to detect whether there is connection between the two ends of the VPN tunnel. If one end is disconnected, the device will disconnect the tunnel automatically and then create new connection. Users can define the transmission time for each

DPD message packet, and the default value is 10 seconds

106

Enterprise Multi-WAN VPN QoS Router

10.1.3. PPTP Server

It supports the PPTP of Window XP/ 2000 to create point-to-point tunnel protocol for single- device users to create VPN connection.

107

Enterprise Multi-WAN VPN QoS Router

Enabled PPTP Server

When this option is selected, the point-to-point tunnel protocol PPTP server can be enabled.

PPTP IP Address Range Please enter PPTP IP address range so as to provide the remote users with an entrance IP into the local network. Enter Range Start:

Enter the value into the last field. Enter Range End: Enter the value into the last field.

Username

Password

Please enter the name of the remote user.

Enter the password and confirm again by entering the new password.

108

Enterprise Multi-WAN VPN QoS Router

Confirm Password

Add to list

Delete selected item

10.1.4. VPN Pass Through

Add a new account and password.

Delete Selected Item.

IPSec Pass Through

PPTP Pass Through

L2TP Pass Through

If this option is enabled, the PC is allowed to use VPN- IPSec packet to pass in order to connect to external VPN device.

If this option is enabled, the PC is allowed to use VPN- PPTP packet to pass in order to connect with external VPN device.

If this option is enabled, the PC end is allowed to use VPN-

L2TP packet to pass in order to connect with external VPN device.

After modification, push

“Apply” button to save the network setting or push “Cancel” to keep the settings unchanged.

10.2. QnoKey

Introduces how Qno VPN devices conducts preliminary configuration of the data from the user end and how to set the QnoKey user to successfully create QnoKey by using QnoKey management

109

Enterprise Multi-WAN VPN QoS Router

software.

10.2.1. QnoKey Summary

Login to the web-based UI and click on the QnoKey menu to display the page that summarizes the current status information of QnoKey, as illustrated below:

QnoKey Tunnel Number

Enabled

Displays how many tunnels are applied and the total tunnel number of

QnoKey tunnel. Through advanced setting, users can set the tunnel number of IPSec and QnoKey.

Displays whether QnoKey username is enabled.

Account ID

Displays the user name group of QnoKey.

Server IP address or the applied domain name.

Local IP Address

(Domain Name)

Life Time

Available Time

The present valid time of QnoKey; permanent use is displayed as

Forever.

If the number of days of using QnoKey is set, the remaining time is displayed here.

The upper limited number of QnoKey users.

Account Number

Limitation

Used Number

The number of QnoKey in use.

Online Number

Displays the number of connected devices that are using QnoKey.

110

Delete

Enterprise Multi-WAN VPN QoS Router

Deletes one user name group setting rule.

Goes to the page where summarized information is needed.

Go to

page

Entries per page

Each summary page displays several group messages.

Add Qnokey Group

Delete All Group

Add new group settings.

Delete all the group settings.

10.2.2 Qnokey Group Setup

Press Add New Qnokey Group to enter Group Setup page, as illustrated below.

This page is designed for QnoKey group setup. Group parameters for QnoKey include WAN ports, valid time, and number of users, and protection actions for potential QnoKey losses. These setting options facilitate classified management for QnoKey users and enhance security.

111

Enterprise Multi-WAN VPN QoS Router

Enable this rule

Group Account ID

Interface

Select this option to activate this setting rule.

Enter the QnoKey group name that users would like to set up.

Select WAN port and enter the correct IP address which corresponds to WAN port or the domain name (analyzed by

DDNS).If WAN ports are empty, IP entry is not necessary so that VPN connection will not fail. This option allows users to select which WAN port to make connection, facilitating management. If WAN1 is selected, QnoKey group users can connect through only WAN1. If both WAN 1and WAN 2 are selected, QnoKey group users are allowed to make connection via WAN 1or WAN 2. When WAN1 is disconnected, WAN2 will be automatically connected to back up VPN connection.

Life Time

Account Number

Note:

 If WAN port is selected and the network connection type is set as static IP, the system will automatically display this

WAN IP. Administrator does not need to enter it manually.

 If WAN port is selected and the network connection is set to other types such as DHCP/PPPoE, administrator needs to enter the IP address or domain name (through DDNS analysis).

Set the valid time for QnoKey group. If the QnoKey is for normal and frequent use, the option "Forever" may be selected so the user end valid time is infinite. If the user is more complicated or if it is meant for mobile users who travel on business, the VPN security can be guaranteed by setting the valid time of QnoKey as "1~99" days according to the desired number of days to be set.

Set the maximum number of QnoKey users (from "1~100”)

112

Enterprise Multi-WAN VPN QoS Router

Limitation

Stolen Key Login

Action allowed by the group setting rules.

In the drop-down list, select operation options for the missing

QnoKey.

In the event of losing QnoKey, there are three options for select ion: “Do Nothing”, “Clear Key,” and “Lock Key". Setting this feature on QnoKey can enhance VPN security. Select

"Do Nothing" to do no change after the Key is lost. Select

"Clear Key" to clean up the QnoKey settings when the VPN connection is established again after the QnoKey is lost.

Select "Block Key" to block the VPN connection after the

QnoKey is lost.

Press "Apply" to confirm the group settings and press "Cancel" to cancel the setting. Press "Back" to return the previous page.

Pressing "Apply" to display a dialog box in which it will ask if users want to continue to add new setting group. Click "Ok" to add another group setting or "Cancel" to return to the QnoKey Summary page. It is illustrated as below.

On the QnoKey Summary page, the defined group will be displayed, which is illustrated as below.

113

Enterprise Multi-WAN VPN QoS Router

When a new rule is created, "Show List" and "Edit" button will be displayed behind the rule. Click on

"Show List" to show the list of users applying this group rule. Click "Edit" to change settings. Click the trash can icon to delete this setting.

10.2.3 Qnokey Account List

Click "Show List” to show the Account List page applying this rule.

Group Account ID

Enabled

QnoKey SN

User Name

Status

Stolen Key Login

Displays the group ID to which the user belongs to.

Click this option to activate QnoKey user.

Displays the QnoKey serial number.

Displays the QnoKey user name.

Displays the QnoKey connection status. “Connect” means the user is connected and online; “Disconnect" means no connection and offline.

Select this option to create settings if the QnoKey is lost.

114

Action

Bind MAC

MAC Address

Delete

Enterprise Multi-WAN VPN QoS Router

If there is hardware binding, QnoKey can only execute on the bound PC.

If hardware binding function is enabled, it will show the MAC address which Qnokey is bound with, not the PC MAC address.

Delete the user Qnokey connection information.

115

Enterprise Multi-WAN VPN QoS Router

10.3. QVM VPN Function Setup

The QVM-series device provides three major convenient functions:

1. Smart Link IPSec VPN: Easy VPN setup replaces the conventional complicated VPN setup process by entering Server IP, User Name, and Password.

2. Central Control Feature: Displays a clear VPN connection status of all remote ends and branches. Its central control screen allows setup from remote into external client ends.

3. VPN Disconnection Backup: Solves data transmission problem arising from failed ISP connection with remote ends or the branches.

116

10.3.1. QVM Server Settings

Select QVM Feature as Server mode:

Enterprise Multi-WAN VPN QoS Router

117

Enterprise Multi-WAN VPN QoS Router

Must be identical to that of the remote client end. Account ID

Please enter the remote client user name in either English or Chinese.

Password Must be identical to that of the remote client end.

Confirm Password

Please enter the password and confirm again.

IP Address

Subnet Mask

Refers to the specific network IP address and subnet mask, which has to build connection with the remote client end.

VPN Hub Function After branch and headquarter are connected, branches can access each other easily without having other tunnels.

Active

Add to list

Active this account.

Add a new account and password.

Delete selected item Delete the selected user.

After modification, push

“Apply” button to save the network setting or push “Cancel” to keep the settings unchanged.

118

Enterprise Multi-WAN VPN QoS Router

XI. Virtue Route

Virtual Router enable the branch only has single ISP service can enjoy two different broadband network. The branch can access another ISP network with connecting to headquarter server with dual-bradband connection. As the result, the linking problem between different ISP network will be sloved.

As the figure showed above, Café A has only one ISP service. Because of narrow bandwidth between two different ISP, the connection speed that users access to the web or on-line game on another network will be very slow. On the other hands, Café B owns two different ISP service. No matter what network users access to, the connection speed will be fast.

119

Enterprise Multi-WAN VPN QoS Router

Café A can enable virtual route function and link to Café B’s device. They can access another ISP service through Café B’s network. It seems that Café A employ dual ISP service, too. If users in Café A want to access to another ISP network, the link speed won’t be restricted.

120

Enterprise Multi-WAN VPN QoS Router

11.1 Virtue Route Server (PPTP Server)

The Chapter intrduces how to configure a Virtue Route server. Virtue Route builds PPTP on the basis of PPP (Point-to-point Protocol), it strengthens the security of PPP. Virtue Route enables encryption transmission between PPTP server and client, and enables PPTP server to verify the remote clients.

Go to “PPTP Setup” and click “Enabled PPTP Server.”

121

Enterprise Multi-WAN VPN QoS Router

Enabled PPTP Server

When this option is selected, the point-to-point tunnel protocol PPTP server can be enabled.

PPTP IP Address Range Please enter PPTP IP address range so as to provide the remote users with an entrance IP into the local network. Enter Range Start:

Enter the value into the last field. Enter Range End: Enter the value into the last field.

Username

Password

Please enter the name of the remote user.

Enter the password and confirm again by entering the new password.

Confirm Password

Add to list

Add a new account and password.

122

Enterprise Multi-WAN VPN QoS Router

Delete Selected Item.

Delete selected item

All PPTP Status:Displays all successfully connected users, including username, remote IP address, and PPTP address.

123

Enterprise Multi-WAN VPN QoS Router

XII. SSL VPN

For SSL VPN, client only need a web browser to access to Central servers. Passing the ID, and you get the portal to the company

’s internal resources, such as Internet services, Microsoft terminal services, remote desktop services, online neighborhood networks, and secure tunnel functions. Meanwhile, different users or groups can access to different interfaces according to the web administrator

’s configurations, which satisfies external and mobile users' security requirements.

Below introduces SSL VPN related settings.

124

Enterprise Multi-WAN VPN QoS Router

SSL VPN

SSL (Secure Sockets Layer) is a protocol that ensures secure data transmission over the Internet via

HTTPS encryption; including server authentication, user authentication, and SSL data link integrity and security. SSL VPN is an LAN application service that remote users are provided with web page security through a SSL VPN gateway. Because SSL VPN uses a standard, built-in web browser SSL/HTTPS secure transmission mechanism, there are no required installations or settings for clients. Clients can access remote data via a web browser such as IE or Netscape. This simple setup requires no client software, costs less and is highly adaptable with other networks. Administrators can also use the same ID for user ID authentication mechanism, network access, and classification management. This prevents enterprise information’s complete transparency and provides an increasing level of security safeguards.

12.1 Status

Block Status shows current SSL VPN users' online status.

Tunnel(s) Used:

Display the amount of previously set tunnels.

Tunnel(s) Available:

Display the amount of unused tunnels.

User:

Display the current SSL tunnel user name.

125

Group:

IP:

Login Time:

User Type:

Logout:

Enterprise Multi-WAN VPN QoS Router

Display the name of current SSL tunnel using Group.

Display current users' SSL tunnel remote IP addresses.

Display current SSL tunnel users' login time.

Display whether the user is an administrator or a staff.

Logout when clicking on the icon.

12.2 Group Summary

Group Summary table displays group setting information. Group settings can be modified here and new users can also be added.

Group:

Domain:

User:

Display the group

’s name. SSL VPN has 4 built-in groups by default (All

Users, Supervisor, Mobile User, & Branch Staff). If one group needs to be edited, click on its name to access the group management page.

Display the authentication server name used corresponding to certain group, which is served as Local Database by default.

Click "Detail" to view a specific group's user names and types.

126

Resource:

Enterprise Multi-WAN VPN QoS Router

Click "Detail" to view a specific group's available service resources. The

4 default group's authentication service resources are all listed in the following service resource configuration explanation.

Delete:

Status:

Add New Group:

Click the recycle bin icon to delete a group.

Display whether the group configuration is Enabled or Disabled.

Defaults for the All Users group are Enabled and for others are

Disabled.

Click the "Add New Group" tab, entering the group admin section to add a new group.

12.3 Group Management:

Group Management helps the web administrator organize users

’ access to internal service resources in groups. It can be configured by following 3 steps: Domain Management, User management, and Service

Resource management. In addition, SSL VPN's unique "One- Click" makes your basic configurations fast.

127

Enterprise Multi-WAN VPN QoS Router

128

Group Name:

Enterprise Multi-WAN VPN QoS Router

Group Name: Display all group names in the drop down list.

Add New Group: Click it to create a new group.

Add New Group

Group Name:

Submit:

Import a group name.

Click "Submit" tab to save recent changed settings; new group names will appear in the drop down menu.

Click "Cancel" to clear any recent changes to the settings.

Cancel:

Each group must follow below steps (Domain Management, User management, and Service resource management) to complete group settings.

Step One: Domain Management

129

Enterprise Multi-WAN VPN QoS Router

Domain Management is used to determine which authentication server will be used to authenticate users at login. The default authentication server type is local database. SSL VPN supports external authentication services and can be combined with an enterprise's current authentication server for a simplified deployment. If no suitable authentication servers can be chosen from the list, click "Add New

Domain" to create a new one.

Assign:

Domain Names:

Authentication Type:

Authentication server IP:

All authentication servers with defined settings will be displayed on Domain

Management list. You are required to choose one authentication server to be assigned to this group. Each group can only be assigned to one type of

authentication server. Default is Local Database. If there are changes to the domain servers designated by All Users, other groups that have yet to enable will also be modified accordingly.

Display all authentication server names.

Display authentication server type.

Display external authentication server IP addresses. If the Authentication Type is

Local Database, the authentication server IP address will not be displayed.

130

User Database:

Edit:

Enterprise Multi-WAN VPN QoS Router

For external authentication servers, the user database will be: "Apply User

Database

” and "Customize User Database".

Click "Apply User database", then there is no need to establish additional user data, and the system will directly apply the external authentication server's internal user database settings. As long as the users belong to this authentication server group, they can use the group's resources.

Note: If multiple groups designate the same authentication server for users, only one group will be able to use the built-in user database at one time. For this reason, it is recommended that the largest group be designated to use the built-in user database and other smaller groups use the "Customize User Database".

Select the "Customize User Database", the administrator must add a new user to the group (See step two: User management). If users have not been set by the administrator, users of the authentication server can still pass the authentication, but they will not be able to access the web portal to use internal enterprise resources.

Click on the "Edit" tab to make changes to the server addresses and authentication domain names. Authentication server type and authentication service name cannot be altered. If you want to change the authentication server type and authentication service name, delete them, and then set up a new authentication server.

Delete:

Click on the recycle bin icon to delete authentication server settings.

Adding New Authentication Service

SSL VPN, in addition to Local Database, supports another 7 kinds of authentication server types:

Radius-PAP/CHAP/MSCHAP/MSCHSPV2, NT-Domain, Active Directory, and LDAP.

1. Local Database

131

Enterprise Multi-WAN VPN QoS Router

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Names:

Name the selected authentication server.

Submit:

Cancel:

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

2. Radius-PAP

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Names:

Name the selected authentication server.

RADIUS Server:

Secret Password:

Enter authentication server address.

Enter the password for RADIUS.

Submit:

Cancel:

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

132

3. Radius-CHAP

Enterprise Multi-WAN VPN QoS Router

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Names:

Name the selected authentication server.

RADIUS Server:

Enter authentication server address.

Secret Password:

Enter the password for RADIUS.

Submit:

Cancel:

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

4. Radius-MSCHAP

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Names:

Name the selected authentication server.

RADIUS Server:

Enter authentication server address.

133

Enterprise Multi-WAN VPN QoS Router

Secret Password:

Submit:

Cancel:

5. Radius-MSCHAPV2

Enter the password for RADIUS.

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Names:

Name the selected authentication server.

RADIUS Server:

Enter authentication server address.

Secret Password:

Enter the password for RADIUS.

Submit:

Cancel:

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

6. NT-Domain

134

Enterprise Multi-WAN VPN QoS Router

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Names:

Name the selected authentication server.

NT Server Address:

Enter the NT-Domain authentication server address.

NT Domain Name:

Enter NT-Domain authentication domain name. For example, qno.com.

Submit:

Cancel:

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

7. Active Directory

Authentication Type:

Select the authentication server type from the drop down menu.

Domain Name:

Name the selected authentication server.

Server Address:

Active Directory

Domain:

Enter Active Directory authentication server address.

Enter Active Directory authentication server’s domain name. For example, qno.com

Submit:

Cancel:

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

8. LDAP

135

Enterprise Multi-WAN VPN QoS Router

Authentication Type:

Domain Names:

Server Address:

LDAP BaseDN*:

Select the authentication service type you wish to use from the drop down menu.

Name the selected authentication server.

Enter authentication server address.

Enter LDAP authentication server’s authentication domain name

(LDAP BaseDN*).

Click on the "Submit" tab to save changes

Click "Cancel" to clear any recent changes to the settings.

Submit:

Cancel:

One Click:

SSL VPN provides one-click setting. With fewest configurations, all users can use SSL tunnels to access an open internal resource. While in "All Users" group, the authentication server settings support the current enterprise authentication server. So all users, after being identified via the authentication server, will be directed to the portal and can use the full range of enterprise resources. For Authentication server settings, see step one below: Domain Management.

If you don't want all users to access the full range of available resources, go to "All Users" group settings to disable or modify settings in sequential order according to the following steps.

If you want to use the one-click function, after you have added new authentication servers, complete the setup by assigning the All Users group authentication server to the newly created authentication server.

Note: All of the users in this authentication server can link to the web portal and access all of the enterprise resources pre-determined by administrators. Administrators do not need to define settings for step 2 (User

136

Enterprise Multi-WAN VPN QoS Router

management) and step 3 (Service resources management).

Step 2: User Management

User Management determines who belong to this group and have the right to use the resources. Newly added users will appear on the user list; click on "Assign to this Group" column to designate a user to this group. If "Domain Management" is set to "Customize User Database" and when the user list does not have a suitable user, click "Add New User" to create a new one.

Assign to this

Group:

User Name:

Select a user from the user list to assign to this group. One user can be assigned to one group only.

Display customized user name.

Please note: The built- in users of the authentication server database in

Domain Management will not display on the user list.

137

Enterprise Multi-WAN VPN QoS Router

Edit:

User passwords (if Local Database), expiration dates, user classifications, and inactive timeouts can be edited or modified, but user authentication servers and user names cannot. If you want to modify a user name, first delete it, and then add a new modified user name.

Delete this user.

Delete:

Add New User

Click on “Add new user” and the window below will pop up.

Please note: In addition to Local Database, user names and passwords must correspond to the selected authentication server’s user names.

Domain Name:

User Name:

Display the authentication server name used by this group.

Enter authentication server’s user name.

138

Enterprise Multi-WAN VPN QoS Router

Password:

Expiration

(yyyy/mm/dd):

Date

User Type:

Inactive timeout:

Add to List:

Save Setting:

Cancel:

Exit:

For Local Database, enter user passwords. Passwords do not need to be entered if Local Database is not used.

Enter users' permitted time limit. For example, if the expiration date is set to November 1, 2007, then the user will be denied beginning on

November 2, 2007 at 12: 00 AM.

If set to "Administrator", the user will login on the router management UI.

If set to "U user", the user will login on the web portal.

Please note: Only Local Database users can be set as "Administrator"; external authentication server users can only be "Users" and cannot login on the router management UI.

Even though a user has logged in via the web portal, he/she will be forced to logout (timeout) due to inactivity after 10 minutes. If a user logs into the web portal to access enterprise resources using a SSL in an unsafe environment, a shorter timeout time is recommended to mitigate risk if the user is logged in but inactive.

After completing the above settings, click on "add to list" to add newly created user settings to the corresponding list.

After complete settings, click on the “Save Setting” tab to save.

Click on the “Cancel” tab to cancel all unsaved settings.

Click on the “Exit” tab to close the “add new user” window.

Step 3: Service Resource Management:

Service resource management settings determine which enterprise resources a group's users can use.

The checked resources will be the icons which are available to the users after they have logged on to the web portal. If users are not allowed to enter resource addresses or names, administrators can opt to not activate that resource and bookmark the limits of users' access to resources. For example, if a company has multiple FTP servers internally, and when FTP service is activated, then a group's users can connect through the web portal and enter the FTP servers if they want to access. If an administrator has not activated FTP service, but has only bookmarked one FTP, then the group's users can only access the bookmarked FTP server.

139

Enterprise Multi-WAN VPN QoS Router

Default values for each built-in user groups are shown in the following table.

Resource name/Group name

All Users Supervisor Mobile User

Internet Services

Telnet

SSH

Branch Staff

140

Enterprise Multi-WAN VPN QoS Router

FTP

Microsoft Terminal

Services

   

Word

Excel

Power Point

Access

Outlook

IE

FrontPage

ERP

 

Remote Desktop

RDP5

VNC

My Network Place

Virtual Passage

Configure Bookmark for this Group

Services (Telnet, SSH, FTP) and remote desktop services (RDP5, VNC) can use group established bookmarks. Users are not required to remember or set a server name or IP address.

Administrators can see all configured bookmarks here, which will display on a user web portal. Users are not required to remember or set a server name or IP address; they can click to use the administrator pre-configured resources.

141

Bookmark configured for this group:

Enterprise Multi-WAN VPN QoS Router

Bookmark Name:

Enter the service resource name; this name will appear on the user's web portal as the service name.

Name or IP address:

Enter the service name or IP address.

Service:

Select a service from the drop down menu below, for example:

Add to List:

Save Setting:

Cancel:

Exit:

Telnet/SSH/FTP.

After completing the previous steps, click on the “Add to List” tab to add the bookmark setting into the list.

After settings are complete, click on the “Save Setting” tab to save.

Click on the “Cancel” tab to cancel all unsaved settings.

Click on the “Exit” tab to close the window.

Bookmark configured for this group: Remote desktop service

142

Enterprise Multi-WAN VPN QoS Router

Bookmark Name:

Enter the service resource name; this name will appear on the user's web portal as the service name.

Name or IP address:

Enter the service name or IP address.

Service:

Select remote desktop service RDP5/VNC from the drop down menu.

Screen Size:

Configure user remote desktop screen display dimensions: 680x480,

Add to List:

800x600, 1027x768 or full-screen

After completing the previous steps, click on the “Add to List” tab to add

Save Setting:

Cancel:

Exit:

the bookmark setting into the list.

After complete settings, click on the “Save Setting” tab to save.

Click on the “Cancel” tab to cancel all unsaved settings.

Click on the “Exit” tab to close the window.

Permit Customized Bookmarks

If an administrator activates “Permit Customized Bookmarks”, then users should click "Add Bookmark" to

143

Enterprise Multi-WAN VPN QoS Router

configure a service name or IP address to use that resource.

12.4 Domain Management

In addition to selecting 12.3

“Group Management”, SSL VPN can also provide authentication to display

Domain Management. All authentication services will be shown in the Domain Management list. Groups using authentication services will be displayed according to the authentication server name.

User Staff All User Group Supervisor

Group

Mobile

Group

Branch

Group

Step One: Domain

Management

Step 2:

Management

User

Step 3: Service

Resource

Management:

144

Enterprise Multi-WAN VPN QoS Router

Domain Name:

All newly added authentication services will be displayed on the Domain

Management list.

Authentication Type:

Authentication service types are displayed by authentication server name, including: Local Database, Radius- PAP/ CHAP/ MSCHAP/

MSCHAPV2, NT-Domain, Active Directory and LDAP.

Display configured external authentication server IP addresses.

Authentication

Server IP:

Group:

Edit:

Delete:

Display authentication server group names.

Click on the “Edit” tab to select an authentication server IP address and edit authentication domain names.

Click on t he “clear” tab to clear the selected authentication server.

Add New Domain

See 12.3

“Group Management”.

12.5 User Management

In addition to selecting 12.3 Group Management to configure group settings, SSL VPN can also provide inter-group user management. On the user management list, each authentication server will display all self-defined users that can be appointed to groups.

All User Group Supervisor

Group

Mobile

Group

User Branch

Group

Staff

Step One: Domain

Management

Step 2:

Management

User

145

Step 3: Service

Resource

Management:

Enterprise Multi-WAN VPN QoS Router

Domain Name:

Authentication Type:

Displays the name of the authentication server type and also shows

User Name:

Group:

default is Local Database.

Displays authentication server’s self-defined user names.

Displays which group the user belongs to; from here you can modify user groups.

Edit:

Select an authentication server to perform user management on from the drop down menu.

User passwords (if Local Database), expiration dates, user classifications, and inactive timeouts can be edited or modified, but user authentication servers and user names cannot. If you want to modify a user name, first delete it, and then add a new user name. You can also select an authentication server to edit IP address and domain name.

146

Enterprise Multi-WAN VPN QoS Router

Delete:

Click on the “Delete” tab to delete selected users.

Add New User

Click on “Add New User” and then the window below will pop up.

Please note: In addition to the local database, user names and passwords must correspond to the selected authentication server’s user names.

Domain Name:

User Name:

Password:

Expiration

(yyyy/mm/dd):

Date

Displays the authentication server name.

Enter authentication server’s user names.

For Local Database, enter user passwords. Passwords do not need to be entered if Local Database is not used.

Enter users' permitted time limit. For example, if the expiration date is set to November 1, 2007, then the user will be denied beginning on

November 2, 2007 at 12: 00 AM.

147

Add to List:

Confirm:

Cancel:

Exit:

User Type:

Inactive timeout:

Enterprise Multi-WAN VPN QoS Router

If set to "Administrator", the user will login on the router management UI.

If set to "User", the user will login on the web portal.

Please note: Only Local Database users can be set as "Administrator", external authentication server users can only be "User" and cannot login on the router management UI.

Even though a user has logged in via the web portal, he/she will be forced to logout (timeout) due to inactivity after 10 minutes. If a user logs into the web portal to access enterprise resources using a SSL in an unsafe environment, a shorter timeout time is recommended to mitigate risk if the user is logged in but inactive.

After completing the above settings, click on "Add to List" to add newly created user settings to the corresponding list.

After settings are complete, click on the “Confirm” tab to save.

Click on the “Cancel” tab to cancel all unsaved settings.

Click on the “Exit” tab to close the window.

148

12.6 Service Resource Management

Enterprise Multi-WAN VPN QoS Router

12.6.1 Banner

Set the headings for users’ web portal, including enterprise and resource names.

149

Enterprise Multi-WAN VPN QoS Router

12.6.2 Resource Configuration

SSL VPN supports common Microsoft terminal services (including Word, Excel, PowerPoint, Access,

Outlook,

IE, FrontPage, and ERP). Administrators can also click on the “Add New Terminal Service” tab to add additional terminal services.

Resource Name:

Service:

Host Address:

Edit:

Delete:

Display resource name, including SSL VPN supported terminal services like Word, Excel, PowerPoint, Access, Outlook, IE, FrontPage, and

ERP.

Display different service icons, which will show on a user’s web portal.

Display terminal server address.

Provides selected resource application program paths, execution paths, server addresses, and application program image editing. SSL VPN supports built-in application program paths c: \program files\Microsoft office\office\windword.exe. If you have installed Microsoft terminal services that have a different server path, modification will be required.

Microsoft terminal service is

“Disabled” by default. Once Microsoft terminal service server is set up and configured, activate it to avoid limited services for group users.

If there is no need to support terminal services, click on the delete icon to delete the resource.

150

Enterprise Multi-WAN VPN QoS Router

Status:

Displays server resource status as Enabled or Disabled.

Add New Terminal Server

If an enterprise has multiple internal terminal servers, click on the “Add New Terminal Service” tab to add a new terminal service.

Application

Description:

Import an application name.

Application

Enable: and

Set installation path this of application server.

Path:

Working Directory:

Set application working directory.

Host Address:

Set server address.

Application Icon:

Select the server icon. In addition to built-in icons, there are also commonly used icons.

Check to activate this service.

151

12.7 Link to Portal

Enterprise Multi-WAN VPN QoS Router

If user management settings have the user type set to “Administrator”, the user will login on the router management UI. For login to the web portal, click “Link to Portal”.

12.8 Advanced Settings

Advanced Settings can modify SSL connection ports & add SSL upgrades.

152

Enterprise Multi-WAN VPN QoS Router

12.8.1 Virtual Passage

A virtual passage is a type of point-to-point SSL client connection. When remote users use a secure tunnel to connect, SSL VPN will establish a virtual web interface. For this reason, you will need to set SSL

VPN's secure tunnel client address range so it does not conflict with your company's Internet DHCP IP.

Default for 5 SSL users is 192.168.1.200 to 192.168.1.205.

Unified IP Management:

153

Enterprise Multi-WAN VPN QoS Router

The Unified IP Management configuration window can set LAN IP range, DHCP IP range, SSL virtual passage IP range, and PPTP IP address range.

LAN Settings:

The system default for LAN IP is 192.168.1.1, and subnet mask is 255.255.255.0. Changes can be made

154

Enterprise Multi-WAN VPN QoS Router

based on actual network architecture.

Multiple-Subnet Settings:

Select "Multiple Subnet", and enter the subnet IP address/ subnet mask you want to add. This function is to add the router's different LAN IPs in different ranges to the router identified LAN. Therefore, PCs in LAN already having configured IPs, which are different from LAN IP range, can still go online directly. For example, there are several IP ranges in LAN, such as 192.168.3.0, 192.168.20.0, 192.168.150.0, etc. When all of these ranges are added to a subnet, the PCs in these ranges don't need to make any modification and can go online.

This can be done with your actual internet architecture.

Dynamic IP:

SSL VPN firewall has 4 Class C DHCP servers and is enabled by default, which can provide PCs in LAN to get IPs automatically (like DHCP service in NT server). So each PC isn't required to record or set other IP addresses. After a computer starting, SSL VPN firewall will automatically acquire an IP address.

Range Start:

Range End:

The initial IP for the 4 ranges by default are 192.168.1.100,

192.168.2.100, 192.168.3.100, and 192.168.3.100. Changes can be made by actual requirements.

The last IP for the 4 ranges by default are 192.168.1.149,

192.168.2.149, 192.168.3.149, 192.168.4.149. Factory default allows to

50 IP addresses in each range. A total of 200 computers can automatically acquire IP addresses. Changes can be made by actual requirements.

Virtual Passage:

When the client uses SSL secure tunnel to connect to SSL VPN, SSL VPN will assign a LAN IP address to the user. You can use SSL VPN's supported SSL tunnels to adjust "client start addresses" and "client end addresses" to provide ample LAN IP the SSL secure tunnel clients. Ensure that the secure tunnel IP range doesn’t conflict with the DHCP IP range or the PPTP secure tunnel IP range.

PPTP IP Address Distribution Range:

When a client uses PPTP to dial into the SSL VPN, SSL VPN will assign a LAN IP address for the client. You can adjust

“Range Start” and “Range End” by purchasing SSL tunnel quantity. In this way, you can provide sufficient LAN IPs for SSL tunnel users. Please Note: IP ranges for virtual passage cannot have conflict with those in DHCP and PPTP tunnels.

155

Enterprise Multi-WAN VPN QoS Router

12.8.2 Advanced Configurations

The SSL default port is 443. If port 443 is being used by another internal application, you can use the

SSL VPN’s service port drop down menu to select a different one (10443, 20443). Remind: If you change a port other than the default 443, when a client connects to the SSL VPN, the port number will have to be entered after the address.

12.8.3 SSL Upgrade Serial Number

In addition to SSL VPN default SSL tunnel, if you want to upgrade for additional tunnels, please contact your Qno distribution representatives to order the upgraded edition. After purchasing, an SSL upgrade serial number will be provided. Enter the serial number in the "SSL Upgrade Serial Number" blank and the tunnel quantity in "SSL Upgrade Tunnel Number". After that, click "Apply", and you can successfully upgrade the SSL tunnels. You can go to “Status” to view “Tunnel(s) Used” and “Tunnel(s) Available” to confirm whether your upgrade is successful or not .

156

XIII. Advanced Function

13.1 DMZ Host/ Port Range Forwarding

Enterprise Multi-WAN VPN QoS Router

13.1.1 DMZ Host

When the NAT mode is activated, sometimes users may need to use applications that do not support virtual IP addresses such as network games. We recommend that users map the device actual

WAN IP addresses directly to the Intranet virtual IP addresses, as follows:

If the “DMZ Host” function is selected, to cancel this function, users must input "0” in the following

“DMZ Private IP”. This function will then be closed.

After the changes are completed, click

“Apply” to save the network configuration modification, or click

“Cancel" to leave without making any changes.

13.1.2 Port Range Forwarding

Setting up a Port Forwarding Virtual Host: If the server function (which means the server for an external service such as WWW, FTP, Mail, etc) is contained in the network, we recommend that users use the firewall function to set up the host as a virtual host, and then convert the actual IP addresses

157

Enterprise Multi-WAN VPN QoS Router

(the Internet IP addresses) with Port 80 (the service port of WWW is Port 80) to access the internal server directly. In the configuration page, if a web server address such as 192.168.1.50 and the Port 80 has been set up in the configuration, this web page will be accessible from the Internet by keying in the device actual IP address such as, http://211.243.220.43

.

At this moment, the device actual IP will be converted into “192.168.1.50” by Port 80 to access the web page.

In the same way, to set up other services, please input the server TCP or UDP port number and the virtual host IP addresses.

Service

IP Address

Enabled

Service Port

Management

Add to list

To select from this option the default list of service ports of the virtual host that users want to activate.

Such as: All (TCP&UDP) 0~65535, 80 (80~80) for WWW, and 21~21 for FTP. Please refer to the list of default service ports.

Input the virtual host IP address.

Activate this function.

Add or remove service ports from the list of service ports.

Add to the active service content.

Service Port Management

The services in the list mentioned above are frequently used services. If the service users want to

158

Enterprise Multi-WAN VPN QoS Router

activate is not in the list, we recommend that users use “Service Port Management” to add or remove ports, as follows:

Service Name

Protocol

Port Range

Add to list

Delete selected item

Apply

Input the name of the service port users want to activate on the list, such as E-donkey, etc.

To select whether a service port is TCP or UDP.

To activate this function, input the range of the service port locations users want to activate such as 500~500 or 2300~2310, etc.

Add the service to the service list. It supports up to 100 rules.

To remove the selected services.

Click the “Apply” button to save the modification.

159

Cancel

Close

Enterprise Multi-WAN VPN QoS Router

Click the

“Cancel” button to cancel the modification. This only works before

“Apply” is clicked.

Quit this configuration window.

160

Enterprise Multi-WAN VPN QoS Router

13.2 Routing

In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing

Information Protocol.

13.3.1 Dynamic Routing

The abbreviation of Routing Information Protocol is RIP. There are two kinds of RIP in the IP environment

– RIP I and RIP II. Since there is usually only one router in a network, ordinarily just Static

Routing will be used. RIP is used when there is more than one router in a network, and if an administrator doesn’t want to assign a path list one by one to all of the routers, RIP can help refresh the paths.

161

Enterprise Multi-WAN VPN QoS Router

RIP is a very simple routing protocol, in which Distance Vector is used. Distance Vector determines transmission distance in accordance with the number of routers, rather than based on actual session speed.

Therefore, sometimes it will select a path through the least number of routers, rather than through the fastest routers.

Working Mode

RIP

Receive RIP versions

Transmit RIP versions

Select the working mode of the device: NAT mode or router mode.

Click “Enabled” to open the RIP function.

Use Up/Down button to select one of “None, RIPv1, RIPv2, Both

RIPv1 and v2

” as the “TX” function for transmitting dynamic RIP.

Use Up/Down button to select one of “None, RIPv1,

RIPv2-Broadcast, RIPv2-Multicast

” as the “RX” function for receiving dynamic RIP.

13.3.2 Static Routing

When there are more than one router and IP subnets, the routing mode for the device should be configured as static routing. Static routing enables different network nodes to seek necessary paths automatically. It also enables different network nodes to access each other. Click the button “Show Routing

Table

” (as in the figure) to display the current routing list.

162

Enterprise Multi-WAN VPN QoS Router

Dest. IP

Subnet Mask

Gateway

Hop Count

Interface

Add to List

Delete Selected Item

Show Table

Apply

Cancel

Input the remote network IP locations and subnet that is to be routed. For example, the IP/subnet is 192.168.2.0/255.255.255.0.

The default gateway location of the network node which is to be routed.

This is the router layer count for the IP. If there are two routers under the device, users should input “2” for the router layer; the default is

“1”. (Max. is 15.)

This is to select “WAN port” or “LAN port” for network connection location.

Add the routing rule into the list.

Remove the selected routing rule from the list.

Show current routing table.

Click

“Apply” to save the network configuration modification

Click

“Cancel" to leave without making any changes.

163

Enterprise Multi-WAN VPN QoS Router

13.4 One to One NAT

As both the device and ATU-R need only one actual IP, if ISP issued more than one actual IP (such as eight ADSL static IP addresses or more), users can map the remaining real IP addresses to the intranet PC virtual IP addresses. These PCs use private IP addresses in the Intranet, but after having One to One NAT mapping, these PCs will have their own public IP addresses.

For example, if there are more than 2 web servers requiring public IP addresses, administrators can map several public IP addresses directly to internal private IP addresses.

Example:Users have five available IP addresses - 210.11.1.1~5, one of which, 210.11.1.1, has been configured as a real IP for WAN, and is used in NAT. Users can respectively configure the other four real IP addresses for Multi-DMZ, as follows:

210.11.1.2 192.168.1.3

210.11.1.3 192.168.1.4

210.11.1.4 192.168.1.5

210.11.1.5 192.168.1.6

Attention!

The device WAN IP address can not be contained in the One-to-One NAT IP configuration.

164

Enterprise Multi-WAN VPN QoS Router

Enabled One to One NAT: To activate or close the One-to-One NAT function. (Check to activate the function).

Private IP Range Begin

Input the Private IP address for the Intranet One-to-One NAT function.

Public IP Range Begin

Input the Public IP address for the Internet One-to-One NAT function.

Range Length

The numbers of final IP addresses of actual Internet IP addresses. (Please

Add to List

Delete Seleted Item

Apply

Cancel do not include IP addresses in use by WANs.)

Add this configuration to the One-to-One NAT list.

Remove a selected One-to-One NAT list.

Click

“Apply” to save the network configuration modification.

Click

“Cancel" to leave without making any changes.

Attention!

One-to-One NAT mode will change the firewall working mode. If this function has been set up, the

Internet IP server or PC which is mapped with a LAN port will be exposed on the Internet. To prevent

Internet users from actively connecting with the One-on-One NAT server or PC, please set up a proper

165

Enterprise Multi-WAN VPN QoS Router

denial rule for access, as described Firewall.

13.5 DDNS- Dynamic Domain Name Service

DDNS supports the dynamic web address transfer for QnoDDNS.org.cn、3322.org、DynDNS.org and DtDNS.com. This is for VPN connections to a website that is built with dynamic IP addresses, and for dynamic IP remote control. For example, the actual IP address of an ADSL PPPoE time-based system or the actual IP of a cable modem will be changed from time to time. To overcome this problem for users who want to build services such as a website, it offers the function of dynamic web address transfer. This service can be applied from www.qno.cn/ddns , www.3322.org

, www.dyndns.org

, or www.dtdns.com

, and these are free.

Also, in order to solve the issue that DDNS server is not stable, the device can update the dynamic

IP address with different services at the same time.

Select the WAN port to which the configuration is to be edited, for example, WAN 1. Click the hyperlink to enter and edit the settings.

166

Enterprise Multi-WAN VPN QoS Router

Interface:

DDNS:

Username:

Password:

Dynamic Domain Name:

WAN IP Address:

Status:

This is an indication of the WAN port the user has selected.

Check either of the boxes before DynDNS.org, 3322.org, DtDNS.com and QnoDDNS.org.cn to select one of the four DDNS website address transfer functions.

The name which is set up for DDNS.

Input a complete website address such as abc.qnoddns.org.cn

as a user name for QnoDDNS.

The password which is set up for DDNS.

Input the website address which has been applied from DDNS.

Examples are abc.dyndns.org or xyz.3322.org.

Input the actual dynamic IP address issued by the ISP.

An indication of the status of the current IP function refreshed by DDNS.

167

Apply:

Cancel:

Register for QnoDDNS

Enterprise Multi-WAN VPN QoS Router

After the changes are completed, click

“Apply” to save the network configuration modification.

Click

“Cancel" to leave without making any changes.

1. Please go to Qno website and register the product at http://www.qno.com.tw/english/.

168

Enterprise Multi-WAN VPN QoS Router

2. Input the e-mail address which users used to register this product and the serial number of the product to log in to the QnoDDNS Service System. Be sure to input an available e-mail address so that the password sent from the system to activate QnoDDNS service can be received after the domain name registration.

169

Enterprise Multi-WAN VPN QoS Router

3. Rules for Applying a Domain Name:

●The Domain should have at least 4 letters and no more than 63 letters.

●The Domain name should only consist of a-z (lowercase letter) and 0-9 (numerals) and the first character should be an English letter.

●For products with two WANs, users can apply no more than two DDNS configurations.

●For products with two WANs, users can apply no more than two DDNS configurations.

●For products with eight WANs (or over), users can apply no more than four DDNS configurations.

170

Enterprise Multi-WAN VPN QoS Router

171

Enterprise Multi-WAN VPN QoS Router

13.6 MAC Clone

Some ISP will request for a fixed MAC address (network card physical address) for distributing IP address, which is mostly suitable for cable mode users. Users can input the network card physical address (MAC address: 00-xx-xx-xx-xx-xx) here. The device will adopt this MAC address when requesting IP address from ISP.

Select the WAN port to which the configuration is to be edited; click the hyperlink to enter and edit its configuration. Users can input the MAC address manually. Press “Apply” to save the setting, and press “Cancel” to remove the setting.

Default MAC address is the WAN MAC address.

172

Enterprise Multi-WAN VPN QoS Router

XIV. System Tool

This chapter introduces the management tool for controlling the device and testing network connection.

For security consideration, we strongly suggest to change the password. Password and Time setting is in

Chapter 5.2.

14.1 Diagnostic

The device provides a simple online network diagnostic tool to help users troubleshoot network-related problems. This tool includes DNS Name Lookup (Domain Name Inquiry Test) and Ping (Packet

Delivery/Reception Test).

DNS Name lookup

On this test screen, please enter the host name of the network users want to test. For example, users may enter www.abc.com and press "Go" to start the test. The result will be displayed on this page.

173

Ping

Enterprise Multi-WAN VPN QoS Router

This item informs users of the status quo of the outbound session and allows the user to know the existence of computers online.

On this test screen, please enter the host IP that users want to test such as 192.168.5.20. Press

"Go" to start the test. The result will be displayed on this screen.

174

Enterprise Multi-WAN VPN QoS Router

14.2 Firmware Upgrade

Users may directly upgrade the device firmware on the Firmware Upgrade page. Please confirm all information about the software version in advance. Select and browse the software file, click "Firmware

Upgrade Right Now" to complete the upgrade of the designated file.

Note!

Please read the warning before firmware upgrade.

Users must not exit this screen during upgrade. Otherwise, the upgrade may fail.

175

14.3 Configration Backup

Enterprise Multi-WAN VPN QoS Router

Import Configuration File:

This feature allows users to integrate all backup content of parameter settings into the device. Before upgrade, confirm all information about the software version. Select and browse the backup parameter file:

"config.exp." Select the file and click "Import" to import the file.

Export Configuration File:

This feature allows users to backup all parameter settings. Click "Export" and select the location to save the

"config.exp" file.

176

Enterprise Multi-WAN VPN QoS Router

14.4 System Recover

Users can restart the device with System Recover button.

System Recover

As the figure below, if clicking “Restart Router” button, the dialog block will pop out, confirming if users would like to restart the device.

177

Enterprise Multi-WAN VPN QoS Router

Return to Factory Default Setting

If clicking “Return to Factory Default Setting, the dialog block will pop out, if the device will return to factory default.

178

Enterprise Multi-WAN VPN QoS Router

XV Log

From the log management and look up, we can see the relevant operation status, which is convenient for us to facilitate the setup and operation.

15.1 System Log

Its system log offers three options: system log, E-mail alert, and log setting.

System Log

Enable If this option is selected, the System Log feature will be enabled.

179

Syslog Server

Enterprise Multi-WAN VPN QoS Router

The device provides external system log servers with log collection feature. System log is an industrial standard communications protocol.

It is designed to dynamically capture related system message from the network. The system log provides the source and the destination IP addresses during the connection, service number, and type. To apply this feature, enter the system log server name or the IP address into the empty "system log server" field.

Log Setting

Alert Log

The device provides the following warning message. Click to activate these features: Syn Flooding,

IP Spoofing, Win Nuke, Ping of Death / Unauthorized Login Attempt.

Syn Flooding

Bulky syn packet transmission in a short time causes the overload of the system storage of record in connection information.

IP Spoofing

Win Nuke

Through the packet sniffing, hackers intercept data transmitted on the network. After they access the information, the IP address from the sender is changed so that they can access the resource in the source system.

Servers are attacked or trapped by the Trojan program.

Ping of Death

The system fails because the sent data exceeds the maximum packet that can be handled by the IP protocol.

Unauthorized

Login

If intruders into the device are identified, the message will be sent to the system log.

180

Enterprise Multi-WAN VPN QoS Router

General Log

The device provides the following warning message. Click to activate the feature. System error message, blocked regulations, regulation of passage permission, system configuration change and registration verification.

System Error

Message

Provides the system log with all kinds of error messages. For example, wrong settings, occurrence of abnormal functions, system reactivation, disconnection of PPPoE and so on.

Deny Policies

Allow Policies

Configuration

Change

Authorized Login

If remote users fail to enter the system because of the access rules; for instance, message will be recorded in the system log.

If remote users enter the system because of compliance with access rules; for instance, message will be recorded in the system log.

When the system settings are changed, this message will be sent back to the system log.

Successful entry into the system includes login from the remote end or from the LAN into this device. These messages will be recorded in the system log.

The following is the description of the four buttons allowing online inquiry into the log.

View System Log:

This option allows users to view system log. The message content can be read online via the device. They include All Log, System Log, Access Log, Firewall Log, and VPN log, which is illustrated as below.

181

Enterprise Multi-WAN VPN QoS Router

Outgoing Packet Log:

View system packet log which is sent out from the internal PC to the Internet. This log includes

LAN IP, destination IP, and service port that is applied. It is illustrated as below.

182

Enterprise Multi-WAN VPN QoS Router

Incoming Packet Log:

View system packet log of those entering the firewall. The log includes information about the external source IP addresses, destination IP addresses, and service ports. It is illustrated as below.

Clear Log Now:

This feature clears all the current information on the log.

183

Enterprise Multi-WAN VPN QoS Router

15.2 System Statistic

The device has the real-time surveillance management feature that provides system current operation information such as port location, device name, current WAN link status, IP address, MAC address, subnet mask, default gateway, DNS, number of received/ sent/ total packets , number of received/ sent/ total Bytes, Received and Sent Bytes/Sec., total number of error packets received, total number of the packets dropped, number of session, number of the new Session/Sec., and upstream as well as downstream broadband usage (%).

184

Enterprise Multi-WAN VPN QoS Router

185

Enterprise Multi-WAN VPN QoS Router

15.3 Traffic Statistic

Six messages will be displayed on the Traffic Statistic page to provide better traffic management and control.

Inbound IP Source Address:

The figure displays the source IP address, bytes per second, and percentage.

Outbound IP Source Address:

The figure displays the source IP address, bytes per second, and percentage.

186

Enterprise Multi-WAN VPN QoS Router

Inbound IP Service:

The figure displays the network protocol type, destination IP address, bytes per second, and percentage.

Outbound IP Service:

The figure displays the network protocol type, destination IP address, bytes per second, and percentage.

187

Enterprise Multi-WAN VPN QoS Router

Inbound IP Session:

The figure displays the source IP address, network protocol type, source port, destination IP address, destination port, bytes per second and percentage.

Outbound Session:

The figure displays the source IP address, network protocol type, source port, destination IP address, destination port, bytes per second and percentage.

15.4 IP/ Port Statistic

The device allows administrators to inquire a specific IP (or from a specific port) about the addresses that this IP had visited, or the users (source IP) who used this service port. This facilitates the identification of websites that needs authentication but allows a single WAN port rather than

Multi-WANs. Administrators may find out the destination IP for protocol binding to solve this login problem. For example, when certain port software is denied, inquiring about the IP address of this specific software server port may apply this feature. Moreover, to find out BT or P2P software, users may select this feature to inquire users from the port.

188

Enterprise Multi-WAN VPN QoS Router

Specific IP Status:

Enter the IP address that users want to inquire, and then the entire destination IP connected to remote devices as well as the number of ports will be displayed.

189

Specific Port Status:

Enterprise Multi-WAN VPN QoS Router

Enter the service port number in the field and IP that are currently used by this port will be displayed.

190

Enterprise Multi-WAN VPN QoS Router

XVI. Log out

On the top right corner of the web- based UI, there is a Logout button. Click on it to log out of the web- based UI. To enter next time, open the Web browser and enter the IP address, user name and password to log in.

191

Enterprise Multi-WAN VPN QoS Router

Appendix I: User Interface and User Manual Chapter Cross Reference

This appendix is to show the corresponding index for each chapter and user interface. Users can find how to setup quickly and understand the VPN Router capability at the same time.

VPN Router overall interface is as below.

Category

Home

Basic Setting

QoS

Sub- category

Network Connection

Traffic Management

Protocol Binding

Bandwidth

Management

Session Control

Chapter

V. Device Spec Verification, Status Display and Login Password and Time Setting

5.1 Home

VI. Network

6.1 Network Connection

6.2 Multi- WAN Setting

6.2 Multi- WAN Setting

VIII. QoS

8.1 (QoS)

8.3 Bandwidth Management

8.2 Session Limit

192

IP/DHCP

Firewall

Advanced Function

System Tool

Port Management

VPN

Enterprise Multi-WAN VPN QoS Router

Setup

Status

IP & MAC Binding

IP Grouping

General Policy

Access Rule

Content Filter

DMZ/Forwarding

UPnP

Routing

One to One NAT

DDNS

MAC Clone

Password

Diagnostic

Firmware Upgrade

Setting Backup

SNMP

Time

System Recover

VII. Intranet Configuration

7.3 DHCP/ IP

7.4 DHCP Status

7.5 IP & MAC Binding

7.6 IP Grouping

IX. Firewall

9.1 General Policy

9.2 Restricted Application

9.3 Access Rule

9.4 Content Filter

Xlll. Advanced Setting

13.1 DMZ Host/ Port Range Forwarding

13.2 UPnP- Universal Plug and Play

13.3 Routing

13.4 One to One NAT

13.5 DDNS

13.6 MAC Clone

XlV. System Tool

V. Device Spec Verification, Status Display and Login Password and Time Setting

5.2 Change and Set Login Password and Time

14.1 Diagnostic

14.2 Firmware Upgrade

14.3 Setting Backup

14.4 SNMP

Setup

Status

Summary

Gateway to Gateway

5.2 Change and Set Login Password and Time

14.5 System Recover

VII. Intranet Configuration

7.1 Setup

7.2 Status

X. VPN

10.1.1 Summary

10.1.2.1 Gateway to Gateway

193

Log

QnoKey

QVM VPN

SSL VPN

Enterprise Multi-WAN VPN QoS Router

Client to Gateway

PPTP Setup

PPTP Status

VPN Pass Through

10.1.2.2 Client to Gateway

10.1.3 PPTP Setup

10.1.3 PPTP Status

10.1.4 VPN Pass Through

Summary

QVM Setup

System Log

System Status

Traffic Statistic

IP/Port statistic

10.2 QnoKey

10.2.1 -10.2.3 QnoKey Group and Client

10.3 QVM VPN

10.3.1 QVM VPN Server Setting

10.3.3 QVM VPN Client Setting

10.3.2 QVM Status QVM Status

Connection Status

Group Summary

XII. SSL VPN

12.1 Stauts

12.2 Group Summary

Group Management 12.3 Group Management

Domain Management 12.4 Domain Management

User Management

Service Resource

Management

Link to Portal

Advanced Settings

12,5 User Management

12.6 Service Resource Management

12.7 Link to Portal

12.8 Advanced Settings

XV. Log

15.1 System Log

15.2 System Status

15.3 Traffic Statistic

15.4 IP/Port statistic

194

Enterprise Multi-WAN VPN QoS Router

Appendix II:Troubleshooting

(1) Block BT Download

To block BT and prevent downloading by users, go to the “Firewall -> Content Filter" and select "Enable

Website Block by Keywords," followed by the input of "torrent." This will prevent the users from downloading.

195

(2)Shock Wave and Worm Virus Prevention

Enterprise Multi-WAN VPN QoS Router

Since many users have been attacked by Shock Wave and Worm viruses recently, the internet transmission speed was brought down and the Session bulky increase result in the massive processing load of the device. The following guides users to block this virus' corresponding port for prevention. a. Add this TCP135-139, UDP135-139 and TCP445 Port. b. Use the "Access Rule" in the firewall and set to block these three ports.

196

Enterprise Multi-WAN VPN QoS Router

Use the same method to add

UDP [UDP135~139] and TCP [445~445] Ports. c. Enhance the priority level of these three to the highest.

197

(3)Block QQLive Video Broadcast Setting

Enterprise Multi-WAN VPN QoS Router

QQLive Video broadcast software is a stream media broadcast software. Many clients are bothered by the same problem: When several users apply QQLive Video broadcast software, a greater share of the bandwidth is occupied, thus overloading the device. Therefore, the device responds more slowly or is paralyzed. If the login onto the QQLive Server is blocked, the issue can be resolved. The following relates to

Qno products and provides users with solutions by introducing users how to set up the device. a). Log into the device web- based UI, and enter “Firewall -> Access Rule’. b).

Click "Add New Rule" under "Access Rule" page. Select "Deny" in "Action" under the "Service” rule setting, followed by the selection of "All Traffic [TCP&UDP/1~65535]" from "the service" and select

"Any" for Interface, "Any" for source IP address (users with relevant needs may select either "Single" or

"Range" to block any QQLive login by using one single IP or IP range), followed by the selection of

"Single" of the "Dest. IP and enter the IP address as 121.14.75.155" for the QQLive Server (note that there are more than one IP address for QQLive server. Repeated addition may be needed). Lastly, select

"Always" under the Scheduling setting so that the QQLive Login Time can be set. (If necessary, specific time setting may be undertaken). Click "Apply" to move to the next step.

198

Enterprise Multi-WAN VPN QoS Router

c). Input the following IP address in Dest. IP with repeat operation.

121.14.75.115

60.28.234.117

60.28.235.119

222.28.155.17

QQ LiveVersion:QQ Live 2008 (7.0.4017.0)

Tested on: 2008-07-29

After repeated addition, users may see the links to the QQLive Server blocked. Click "Apply" to block QQLive video broadcast.

199

(4)ARP Virus Attack Prevention

Enterprise Multi-WAN VPN QoS Router

1. ARP Issue and Information

Recently, many cyber cafes in China experienced disconnection (partially or totally) for a short period of time, but connection is resumed quickly. This is caused by the clash with MAC address. When virus-contained MAC mirrors to such NAT equipments as host devices, there is complete disconnection within the network. If it mirrors to other devices of the network, only devices of this affected network have problems. This happens mostly to legendary games especially those with private servers. Evidently, the network is attacked by ARP, which aims to crack the encryption method. By doing so, they hackers may intercept the packet data and user information through the analysis of the game's communication protocol.

Through the spread of this virus, the detailed information of the game players within the local network can be obtained. Their account and information are stolen. The following describes how to prevent such virus attack.

First, let us get down to the definition of ARP (Address Resolution Protocol). In LAN, what is actually transmitted is "frame", in which there is MAC address of the destination host device. Socalled “Address

Analysis” refers to the transferring process of the target IP address into the target MAC address before the host sends out the frame. The basic function of ARP protocol aims to inquire the MAC address of the target equipment via the IP address of the target equipment so as to facilitate the communications.

The Working Principle of ARP Protocol: Computers with TCP/IP protocol have an ARP cache, in which the IP address corresponds to the MAC address (as illustrated).

IP Address MAC

192.168.1.1

192.168.1.2

192.168.1.3

……

00-0f-3d-83-74-28

00-aa-00-62-c5-03

03-aa-01-75-c3-06

……

For example, host A (192.168.1.5) transmits data to Host B (192.168.1.1) .Transmitting data, Host A searches for the destination IP address from the ARP Cache. If it is located, MAC address is known. Simply fill in the MAC address for transmission. If no corresponding IP address is found in ARP cache, Host A will send a broadcast.

The MAC address is “FF.FF.FF.FF.FF.FF,” which is to inquire all the host devices in the

200

Enterprise Multi-WAN VPN QoS Router

same network session about “What is the MAC address of “192.168.1.1"? Other host devices do not respond to the ARP inquiry except host device B, which responds to host device

A when receiving this frame: “The

MAC address of 192.168.1.1 is 00-aa-00-62-c6-

09”. So Host A knows the MAC address of Host B, and it can send data to Host B. Meanwhile, it will update its ARP cache.

Moreover, ARP virus attack can be briefly described as an internal attack to the PC, which causes trouble to the ARP table of the PC. In LAN, IP address was transferred into the second physical address

(MAC address) through ARP protocol. ARP protocol is critical to network security. ARP cheating is caused by fake IP addresses and MAC addresses, and the massive ARP communications traffic will block the network.

The MAC address from the fake source sends ARP response, attacking the high-speed cache mechanism of

ARP. This usually happens to the cyber cafe users. Some or all devices in the shop experience temporal disconnection or failure of going online. It can be resolved by restarting the device; however, the problem repeats shortly after. Cafe Administrators can use arp

–a command to check the ARP table. If the device IP and MAC are changed, it is the typical symptom of ARP virus attack.

Such virus program as PWSteal. lemir or its transformation is worm virus of the Trojan programs affecting Windows 95/ 98/ Me/ NT/ 2000/ XP/ 2003. There are two attack methods affecting the network connection speed: cheat on the ARP table in the device or LAN PC. The former intercepts the gateway data and send ceaselessly a series of wrong MAC messages to the device, which sends out wrong MAC address.

The PC thus cannot receive the messages. The later is ARP attack by fake gateways. A fake gateway is established. The PC which is cheated sends data to this gateway and doesn't go online through the normal device

. From the PC end, the situation is "disconnection“.

For these two situations, the device and client setup must be done to prevent ARP virus attack, which is to guarantee the complete resolution of the issue. The device selection is advised to take into consideration the one with anti-ARP virus attack. Qno products come squarely with such a feature, which is very user-friendly compared to other products.

2. ARP Diagnostic

If one or more computers are affected by the ARP virus, we must learn how to diagnose and take appropriate measures. The following is experience shared by Qno technical engineers with regard to the

ARP prevention.

Through the ARP working principle, it is known that if the ARP cache is changed and the device is constantly notified with the series of error IP or if there is cheat by fake gateway, then the issue of disconnection will affect a great number of devices. This is the typical ARP attack. It is very easy to judge if

201

Enterprise Multi-WAN VPN QoS Router

there is ARP attack. Once users find the PC point where there is problem, users may enter the DOS system to conduct operation, pining the LAN IP to see the packet loss. Enter the ping 192.168.1.1 (Gateway IP address) as illustrated.

If there are cases of packet loss of the ping LAN IP and lf later there is connection, it is possible that the system is attacked by ARP. To verify the situation, we may judge by checking ARP table. Enter the ARP -a command as illustrated below.

It is found that the IP of 192.168.1.1 and 192.168.252 points to the same MAC address as

00-0f-3d-83-74-28. Evidently, this is a cheat by ARP.

3. ARP Solution

Now we understand ARP, ARP cheat and attack, as well as how to identify this type of attack. What comes next is to find out effective prevention measures to stop the network from being attacked. The general solution provided by Qno can be divided into the following three options:

a) Enable “Prevent ARP Virus Attack”:

Enter the device IP address to log in the management webpage of the device

. Enter ”Firewall->

General” and find the option "Prevent ARP Virus Attack" to the right of the page. Click on the option to activate it and click "Apply" at the bottom of the page (see illustrated).

202

Enterprise Multi-WAN VPN QoS Router b) Bind the Gateway IP and MAC address for each PC

This prevents the ARP from cheating IP and its MAC address. First, find out the gateway IP and MAC address on the device end.

On every PC, start or operate cmd to enter the dos operation. Enter arp

–s 192.168.1.1

0a-0f-d4-9e-fb-0b so as to finish the binding of pc01 as illustrated.

For other host devices within the network, follow the same way to enter the IP and MAC address of the corresponding device to complete the binding work. However, if this act restarts the computer, the setting will be cancelled. Therefore, this command can be regarded as a batch of processing documents placed in the activation of the operation system. The batch processing documents can be put in this way:

@echo off arp -d arp -s Router LAN IP Router LAN MAC

For those internal network attacked by Arp, the source must be identified. Method: If the PC fails to

203

Enterprise Multi-WAN VPN QoS Router

go online or there is packet loss of ping, in the DOS screen, input arp

–a command to check if the MAC address of the gateway is the same with the device MAC address. If not, the PC corresponding to the

MAC address is the source of attack.

Solutions for other device users are to make a two-way binding of the IP address and MAC address from both of the PC and device ends in order to carry out the prevention work. However, this is more complicated because the search for the IP and address and MAC increases the workload.

Moreover, there is greater possibility of making errors during the operation.

c) Bind the IP/MAC Address from Device End:

Enter “Setup” under DHCP page. On the down right corner of the screen, there is “IP and MAC Binding,” where users may create IP and MAC binding. On “Enabled,” click on “√” and select “Add to List.” Repeat these steps to add other IP addresses and MAC binding, followed by clicking “Apply” at the bottom of the page.

204

Enterprise Multi-WAN VPN QoS Router

After an item is added to the list, the corresponding message will be displayed in the white block on the bottom. However, such method is not recommended because the inquiry of IP/MAC addresses of all hosts creates heavy workload. Another method to bind IP and MAC is more recommended because of easy operation, reducing workload and time efficiency. It is described in the following.

Enter “Setup” under the DHCP page and look for IP and MAC binding. On the right, there is an option of

"Show new IP user" and click to enter.

205

Enterprise Multi-WAN VPN QoS Router

Click to display IP and MAC binding list dialog box. In this box, the unbinding IP and MAC address corresponding to the PC are displayed. Enter the "Name" of the computer and click on "Enabled" with the display of the “√” icon and push the option on the top right corner of the screen to confirm.

Now the bound options will display on the IP and MAC binding list (as illustrated in Figure 5) and click

"Apply” to finish binding.

206

Enterprise Multi-WAN VPN QoS Router

Though these basic operations can help solve the problem but Qno's technical engineers suggest that further measures should be taken to prevent the ARP attack.

1. Deal with virus source as well as the source device affected by virus through virus killing and the system re-installation. This operation is more important because it solves the source PC which is attacked by

ARP. This can better shelter the network from being attacked.

2. Cyber café administrators should check the LAN virus, install anti-virus software (Ginshan Virus/Reixin must update the virus codes) and conduct virus scanning for the device.

3. Install the patch program for the system. Through Windows Update, the system patch program (critical update, security update and Service Pack)

207

Enterprise Multi-WAN VPN QoS Router

4. Provide system administrators with a sophisticated and strong password for different accounts. It would be best if the password consists of a combination of more than 12 letters, digits, and symbols. Forbid and delete some redundant accounts.

5. Frequently update anti-virus software (virus data base), and set the daily upgrade that allows regular and automatic update. Install and use the network firewall software. Network firewall is important for the process of anti-virus. It can effectively avert the attack from the network and invasion of the virus. Some users of the pirate version of Windows cannot install patches successfully. Users are advised to use network firewall and other measures for protection.

6. Close some unnecessary services and some unnecessary sharing (if the condition is applicable), which includes such management sharing as C$ and D$. Single device user can directly close Server service.

7. Do not open QQ or the link messages sent by MSN online chatting tools in a causal manner. Do not open or execute any strange, suspicious documents, and procedures such as the unknown attachment enclosed in E-mail and plug-in.

4. Summary

ARP attack prevention is a serious and long-term undertaking. The above methods can basically resolve the network problems caused by ARP virus attack. Moreover, clients who adopted similar methods witness good results. However, it is important that network administrators pay special attention to this problem rather than overlooking the issue. It is suggested that the above measures can be adopted to prevent ARP attack, reduce the damage, enhance the work efficiency, and minimize economic loss.

208

Enterprise Multi-WAN VPN QoS Router

Appendix III:Qno Technical Support Information

For more information about the Qno's product and technology, please log onto the Qno's bandwidth forum, refer to the examples of the FTP server, or contact the technical department of Qno's dealers as well as the Qno's Mainland technical center.

Qno Official Website http://www.Qno.com.tw or http://www.Qno.com.tw/English

Taiwan Support Center:

E- mail:[email protected]

209

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents